INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:8323e000 r4:8323e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b293c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca4d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a81b8c r4:85a81800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a81b8c r4:830b8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ed34 r7:df819e48 r6:830b8480 r5:8323e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830b7180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/0:1:10 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:10 tgid:10 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df841d84 r8:00000002 r7:60000113 r6:df841d8c r5:8323ec00 r4:8323ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df841e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b477c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec941000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a86b8c r4:85a86800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a86b8c r4:830b8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323ec00 r8:830b852c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8500 r8:8027ed34 r7:df83de60 r6:830b8600 r5:8323ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf841fb0 to 0xdf841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830b7180 INFO: task kworker/0:1:10 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/1:2:911 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:911 tgid:911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0711d84 r8:00000002 r7:60000113 r6:e0711d8c r5:83a82400 r4:83a82400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a82400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0711e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847eccc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a82400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabcf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ce78c r4:850ce400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ce78c r4:8402d580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a82400 r8:8402d5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8402d580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8402d580 r8:8027ed34 r7:df879e60 r6:83c74780 r5:83a82400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0711fb0 to 0xe0711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8402a9c0 INFO: task kworker/1:2:911 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/1:3:1794 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:1794 tgid:1794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb161d84 r8:00000002 r7:60000113 r6:eb161d8c r5:83a92400 r4:83a92400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a92400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fbf40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a92400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88e1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ce78c r4:855ce400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855ce78c r4:841de580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a92400 r8:841de5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:841de580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841de580 r8:8027ed34 r7:df951e60 r6:83c84400 r5:83a92400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb161fb0 to 0xeb161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:841dcb80 INFO: task kworker/1:3:1794 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/0:5:3116 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3116 tgid:3116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:844fe000 r4:844fe000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844fe000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478e380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df975000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85062f8c r4:85062c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85062f8c r4:849c1680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844fe000 r8:849c16ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1680 r8:8027ed34 r7:df95de60 r6:84765e80 r5:844fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84954840 INFO: task kworker/0:5:3116 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/1:4:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df99dd84 r8:00000002 r7:60000013 r6:df99dd8c r5:840f4800 r4:840f4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df99de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ea980 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502a78c r4:8502a400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502a78c r4:84765c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f4800 r8:84765cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84765c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84765c80 r8:8027ed34 r7:eb161e60 r6:84765a00 r5:840f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf99dfb0 to 0xdf99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759080 INFO: task kworker/1:4:3122 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/0:8:3124 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa05d84 r8:00000002 r7:60000013 r6:dfa05d8c r5:83a80000 r4:83a80000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a80000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a80000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df96f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505478c r4:85054400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505478c r4:849c1580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a80000 r8:849c15ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1580 r8:8027ed34 r7:df9d9e60 r6:84765b00 r5:83a80000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84954cc0 INFO: task kworker/0:8:3124 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/1:5:3126 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df959d84 r8:00000002 r7:60000113 r6:df959d8c r5:83a80c00 r4:83a80c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a80c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df959e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b6a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a80c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead17000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cf38c r4:850cf000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cf38c r4:84765a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a80c00 r8:84765aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84765a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84765a80 r8:8027ed34 r7:eb161e60 r6:84765700 r5:83a80c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf959fb0 to 0xdf959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759240 INFO: task kworker/1:5:3126 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/0:9:3128 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa1dd84 r8:00000002 r7:60000013 r6:dfa1dd8c r5:83a85400 r4:83a85400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a85400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a85400 r7:00000000 r6:83018000 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506378c r4:85063400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506378c r4:849c1800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a85400 r8:849c182c r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1800 r8:8027ed34 r7:df9d9e60 r6:84765780 r5:83a85400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84954e00 INFO: task kworker/0:9:3128 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/0:10:3130 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:83a86c00 r4:83a86c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a86c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85591580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a86c00 r7:00000000 r6:83018000 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:83ea178c r4:83ea1400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:83ea178c r4:849c1480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a86c00 r8:849c14ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1480 r8:8027ed34 r7:dfa1de60 r6:84765280 r5:83a86c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84954d80 INFO: task kworker/0:10:3130 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3131 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:833aa400 r4:833aa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833aa400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562e840 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:833aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e068b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bbb8c r4:856bb800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856bbb8c r4:849c1880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833aa400 r8:849c18ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1880 r8:8027ed34 r7:dfa29e60 r6:849c1a00 r5:833aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849dc080 INFO: task kworker/0:11:3131 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3136 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:83a6b000 r4:83a6b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a6b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ef7c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a6b000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844d3b8c r4:844d3800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844d3b8c r4:84765180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a6b000 r8:847651ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84765180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84765180 r8:8027ed34 r7:eb161e60 r6:849c1a80 r5:83a6b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759680 INFO: task kworker/1:6:3136 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa69d84 r8:00000002 r7:60000013 r6:dfa69d8c r5:8324a400 r4:8324a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85213c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab43000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521d38c r4:8521d000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8521d38c r4:84765000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:8476502c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84765000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84765000 r8:8027ed34 r7:eb161e60 r6:849c1b00 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759700 INFO: task kworker/1:7:3137 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3139 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:8382b000 r4:8382b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8382b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534b940 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8382b000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe17000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521e78c r4:8521e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8521e78c r4:830cd100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8382b000 r8:830cd12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd100 r8:8027ed34 r7:eb161e60 r6:849c1b80 r5:8382b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847598c0 INFO: task kworker/1:8:3139 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3140 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:83a63000 r4:83a63000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a63000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85384cc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a63000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ef000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540838c r4:85408000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540838c r4:830cd080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a63000 r8:830cd0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027ed34 r7:eb161e60 r6:849c1c00 r5:83a63000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759b00 INFO: task kworker/1:9:3140 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3143 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:83a62400 r4:83a62400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a62400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397cc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a62400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0633000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85409b8c r4:85409800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85409b8c r4:83895800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a62400 r8:8389582c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83895800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83895800 r8:8027ed34 r7:eb161e60 r6:849c1c80 r5:83a62400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759a80 INFO: task kworker/1:10:3143 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3144 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:83a66c00 r4:83a66c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a66c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538ed40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa77000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540bf8c r4:8540bc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540bf8c r4:8385a400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a66c00 r8:8385a42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8385a400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8385a400 r8:8027ed34 r7:eb161e60 r6:849c1d00 r5:83a66c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759b40 INFO: task kworker/1:11:3144 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3147 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:83a8c800 r4:83a8c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a8c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b02c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa01000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85494f8c r4:85494c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85494f8c r4:8385a380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a8c800 r8:8385a3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8385a380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8385a380 r8:8027ed34 r7:eb161e60 r6:849c1d80 r5:83a8c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759d00 INFO: task kworker/1:12:3147 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3148 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:83a65400 r4:83a65400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a65400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dd2c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a65400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b578c r4:855b5400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855b578c r4:83bf0480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a65400 r8:83bf04ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bf0480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bf0480 r8:8027ed34 r7:eb161e60 r6:849c1e00 r5:83a65400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759d80 INFO: task kworker/1:13:3148 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3151 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:83a8d400 r4:83a8d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a8d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85524c80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab31000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542478c r4:85424400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8542478c r4:845d9000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a8d400 r8:845d902c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9000 r8:8027ed34 r7:eb161e60 r6:849c1e80 r5:83a8d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b1000 INFO: task kworker/1:14:3151 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3153 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:83a81800 r4:83a81800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a81800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab5d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85424b8c r4:85424800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85424b8c r4:845d9080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a81800 r8:845d90ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9080 r8:8027ed34 r7:eb161e60 r6:845d9100 r5:83a81800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b1000 INFO: task kworker/1:15:3153 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3155 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad1d84 r8:00000002 r7:60000013 r6:dfad1d8c r5:83a68c00 r4:83a68c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a68c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857216c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85694f8c r4:85694c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85694f8c r4:845d9180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a68c00 r8:845d91ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9180 r8:8027ed34 r7:eb161e60 r6:845d9200 r5:83a68c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b1000 INFO: task kworker/1:16:3155 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3156 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:83838000 r4:83838000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83838000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563aac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83838000 r7:00000000 r6:83018200 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e7f8c r4:847e7c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e7f8c r4:845d9280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83838000 r8:845d92ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9280 r8:8027ed34 r7:dfad1e60 r6:845d9300 r5:83838000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b1000 INFO: task kworker/1:17:3156 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3159 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:8383b000 r4:8383b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8383b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85721040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8383b000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb543000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85694b8c r4:85694800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85694b8c r4:845d9380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8383b000 r8:845d93ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9380 r8:8027ed34 r7:dfad1e60 r6:845d9400 r5:8383b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b1600 INFO: task kworker/1:18:3159 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3161 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:84288c00 r4:84288c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84288c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84420f80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84288c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec95d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d4f8c r4:857d4c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d4f8c r4:845d9480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84288c00 r8:845d94ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9480 r8:8027ed34 r7:dfad1e60 r6:845d9500 r5:84288c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b1840 INFO: task kworker/1:19:3161 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3163 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:8428d400 r4:8428d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8428d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85725f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8428d400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc77000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85796f8c r4:85796c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85796f8c r4:845d9580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428d400 r8:845d95ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9580 r8:8027ed34 r7:dfaede60 r6:845d9600 r5:8428d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb25fb0 to 0xdfb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b18c0 INFO: task kworker/1:20:3163 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3164 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:8383a400 r4:8383a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8383a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85572ac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8383a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec567000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577138c r4:85771000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577138c r4:849c1f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8383a400 r8:849c1f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1f00 r8:8027ed34 r7:dfa29e60 r6:845d9680 r5:8383a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849dc2c0 INFO: task kworker/0:12:3164 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3167 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:84108000 r4:84108000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84108000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84108000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8138c r4:85a81000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8138c r4:849c1f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84108000 r8:849c1fac r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1f80 r8:8027ed34 r7:dfb29e60 r6:845d9700 r5:84108000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849dc880 INFO: task kworker/0:13:3167 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3168 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb45d84 r8:00000002 r7:60000113 r6:dfb45d8c r5:84109800 r4:84109800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84109800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85514640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84109800 r7:00000000 r6:83018000 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577338c r4:85773000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577338c r4:849c1400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84109800 r8:849c142c r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1400 r8:8027ed34 r7:dfb39e60 r6:845d9780 r5:84109800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84954ec0 INFO: task kworker/0:14:3168 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:8410e000 r4:8410e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8410e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29700 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8410e000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecabf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8278c r4:85a82400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8278c r4:849c1380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8410e000 r8:849c13ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1380 r8:8027ed34 r7:dfb39e60 r6:845d9800 r5:8410e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84954ec0 INFO: task kworker/0:15:3170 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3173 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:84108c00 r4:84108c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84108c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8499e080 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84108c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb853000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c2f8c r4:858c2c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c2f8c r4:845d9880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84108c00 r8:845d98ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9880 r8:8027ed34 r7:dfaede60 r6:845d9900 r5:84108c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b19c0 INFO: task kworker/1:21:3173 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3175 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb15d84 r8:00000002 r7:60000013 r6:dfb15d8c r5:8410a400 r4:8410a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8410a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8410a400 r7:00000000 r6:83018200 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab53000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d6f8c r4:857d6c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d6f8c r4:845d9980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8410a400 r8:845d99ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9980 r8:8027ed34 r7:dfb49e60 r6:845d9a00 r5:8410a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e000 INFO: task kworker/1:22:3175 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3177 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb69d84 r8:00000002 r7:60000013 r6:dfb69d8c r5:8410b000 r4:8410b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8410b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ecf80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8410b000 r7:00000000 r6:83018200 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a26b8c r4:85a26800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a26b8c r4:845d9a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8410b000 r8:845d9aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9a80 r8:8027ed34 r7:dfb15e60 r6:845d9b00 r5:8410b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e180 INFO: task kworker/1:23:3177 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3180 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:8410d400 r4:8410d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8410d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85966000 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8410d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844dbf8c r4:844dbc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844dbf8c r4:845d9b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8410d400 r8:845d9bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9b80 r8:8027ed34 r7:dfb69e60 r6:845d9c00 r5:8410d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e280 INFO: task kworker/1:24:3180 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3181 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:84289800 r4:84289800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84289800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595b400 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84289800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a25b8c r4:85a25800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a25b8c r4:845d9c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84289800 r8:845d9cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9c80 r8:8027ed34 r7:dfb69e60 r6:845d9d00 r5:84289800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e280 INFO: task kworker/1:25:3181 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3183 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:83a8ec00 r4:83a8ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a8ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a1a980 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb769000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7e38c r4:85a7e000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a7e38c r4:845d9d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a8ec00 r8:845d9dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9d80 r8:8027ed34 r7:dfb69e60 r6:849c1300 r5:83a8ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e600 INFO: task kworker/1:26:3183 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3185 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:83a71800 r4:83a71800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a71800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbd580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a71800 r7:00000000 r6:83018200 r5:00001000 r4:7f1bd000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc31000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531b78c r4:8531b400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8531b78c r4:845d9e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a71800 r8:845d9e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9e00 r8:8027ed34 r7:dfb9de60 r6:842ca280 r5:83a71800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e800 INFO: task kworker/1:27:3185 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbc1d84 r8:00000002 r7:60000113 r6:dfbc1d8c r5:84102400 r4:84102400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84102400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8499e740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84102400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a27f8c r4:85a27c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a27f8c r4:845d9e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84102400 r8:845d9eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9e80 r8:8027ed34 r7:dfba9e60 r6:83363700 r5:84102400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499eb40 INFO: task kworker/1:28:3187 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbc5d84 r8:00000002 r7:60000113 r6:dfbc5d8c r5:84103000 r4:84103000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84103000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84103000 r7:00000000 r6:83018200 r5:00001000 r4:7f133000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e178c r4:844e1400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e178c r4:845d9f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84103000 r8:845d9f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9f00 r8:8027ed34 r7:dfbc1e60 r6:83363680 r5:84103000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499eb40 INFO: task kworker/1:29:3188 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:84105400 r4:84105400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84105400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84105400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca69000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a81f8c r4:85a81c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a81f8c r4:845aa280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84105400 r8:845aa2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:845aa280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845aa280 r8:8027ed34 r7:dfb4de60 r6:845aa380 r5:84105400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a2740 INFO: task kworker/0:16:3191 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:84100c00 r4:84100c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84100c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84100c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb97000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e1f8c r4:844e1c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e1f8c r4:845d9f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84100c00 r8:845d9fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9f80 r8:8027ed34 r7:dfbc1e60 r6:832a1080 r5:84100c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499ecc0 INFO: task kworker/1:30:3192 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:84101800 r4:84101800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84101800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8499ee80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84101800 r7:00000000 r6:83018200 r5:00001000 r4:7f11b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf77000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e1b8c r4:844e1800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e1b8c r4:84766080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84101800 r8:847660ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766080 r8:8027ed34 r7:dfbd9e60 r6:832a1180 r5:84101800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499ec00 INFO: task kworker/1:31:3194 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3198 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbe5d84 r8:00000002 r7:60000113 r6:dfbe5d8c r5:84a68000 r4:84a68000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a68000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a68000 r7:00000000 r6:83018200 r5:00001000 r4:7f26f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecef7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b9db8c r4:85b9d800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b9db8c r4:84766100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a68000 r8:8476612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766100 r8:8027ed34 r7:dfbd9e60 r6:83c74680 r5:84a68000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499ecc0 INFO: task kworker/1:32:3198 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbe9d84 r8:00000002 r7:60000113 r6:dfbe9d8c r5:84a68c00 r4:84a68c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a68c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7700 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f169000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e138c r4:844e1000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e138c r4:84766180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a68c00 r8:847661ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766180 r8:8027ed34 r7:dfbe5e60 r6:832ca680 r5:84a68c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499ecc0 INFO: task kworker/1:33:3199 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3201 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:84a6a400 r4:84a6a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbd400 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f1bb000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbdb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e278c r4:844e2400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e278c r4:84766200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6a400 r8:8476622c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766200 r8:8027ed34 r7:dfbe5e60 r6:832ca600 r5:84a6a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b16c0 INFO: task kworker/1:34:3201 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:84a69800 r4:84a69800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a69800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535a380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a69800 r7:00000000 r6:83018200 r5:00001000 r4:7f169000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9a3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e2b8c r4:844e2800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e2b8c r4:84766280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a69800 r8:847662ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766280 r8:8027ed34 r7:dfbe5e60 r6:832ca580 r5:84a69800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f080 INFO: task kworker/1:35:3203 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3205 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:84a6c800 r4:84a6c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85326b40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6c800 r7:00000000 r6:83018200 r5:00001000 r4:7f22d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c11b8c r4:85c11800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c11b8c r4:84766300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6c800 r8:8476632c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766300 r8:8027ed34 r7:dfbe5e60 r6:84402200 r5:84a6c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f180 INFO: task kworker/1:36:3205 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:84a6bc00 r4:84a6bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cd9f00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2f1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed22f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c1238c r4:85c12000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c1238c r4:84766380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6bc00 r8:847663ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766380 r8:8027ed34 r7:dfbe5e60 r6:84402180 r5:84a6bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f440 INFO: task kworker/1:37:3208 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3209 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:84a6e000 r4:84a6e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8498f480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6e000 r7:00000000 r6:83018200 r5:00001000 r4:7f2c1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3b3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c4478c r4:85c44400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c4478c r4:84766400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6e000 r8:8476642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766400 r8:8027ed34 r7:dfc0de60 r6:8477f400 r5:84a6e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f300 INFO: task kworker/1:38:3209 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84a6d400 r4:84a6d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d37500 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6d400 r7:00000000 r6:83018200 r5:00001000 r4:7f33b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed56d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c5438c r4:85c54000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c5438c r4:84766480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6d400 r8:847664ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766480 r8:8027ed34 r7:dfc0de60 r6:8477f080 r5:84a6d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f800 INFO: task kworker/1:39:3212 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:84a6ec00 r4:84a6ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85379c40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f3d9000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed601000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c1378c r4:85c13400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c1378c r4:84766500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6ec00 r8:8476652c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766500 r8:8027ed34 r7:dfc1de60 r6:8497e000 r5:84a6ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f780 INFO: task kworker/1:40:3214 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3215 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:84a6b000 r4:84a6b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85379840 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6b000 r7:00000000 r6:83018200 r5:00001000 r4:7f3fb000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7f5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c13b8c r4:85c13800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c13b8c r4:84766580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6b000 r8:847665ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766580 r8:8027ed34 r7:dfc21e60 r6:8497e080 r5:84a6b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f780 INFO: task kworker/1:41:3215 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc15d84 r8:00000002 r7:60000013 r6:dfc15d8c r5:83a90000 r4:83a90000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a90000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85379240 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a90000 r7:00000000 r6:83018200 r5:00001000 r4:7f39b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa33000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c1338c r4:85c13000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c1338c r4:84766600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a90000 r8:8476662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766600 r8:8027ed34 r7:dfc21e60 r6:84766680 r5:83a90000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f880 INFO: task kworker/1:42:3218 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3219 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfae1d84 r8:00000002 r7:60000013 r6:dfae1d8c r5:83a91800 r4:83a91800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a91800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d72c40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a91800 r7:00000000 r6:83018200 r5:00001000 r4:7f45b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed93b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c13f8c r4:85c13c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c13f8c r4:84766700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a91800 r8:8476672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766700 r8:8027ed34 r7:dfc15e60 r6:84766780 r5:83a91800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f880 INFO: task kworker/1:43:3219 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3223 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc55d84 r8:00000002 r7:60000113 r6:dfc55d8c r5:83a96000 r4:83a96000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a96000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85379d00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a96000 r7:00000000 r6:83018200 r5:00001000 r4:7f3f3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed77b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c6b78c r4:85c6b400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c6b78c r4:84766800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a96000 r8:8476682c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766800 r8:8027ed34 r7:dfae1e60 r6:84766880 r5:83a96000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc55fb0 to 0xdfc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498fe00 INFO: task kworker/1:44:3223 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3225 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:83a93000 r4:83a93000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a93000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e106c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a93000 r7:00000000 r6:83018200 r5:00001000 r4:7f527000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda0b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85dc2b8c r4:85dc2800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85dc2b8c r4:84766900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a93000 r8:8476692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766900 r8:8027ed34 r7:dfae1e60 r6:84766980 r5:83a93000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498fb80 INFO: task kworker/1:45:3225 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3226 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:83a93c00 r4:83a93c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a93c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849940c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f467000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed725000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e578c r4:844e5400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e578c r4:84766a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a93c00 r8:84766a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766a00 r8:8027ed34 r7:dfc61e60 r6:84766a80 r5:83a93c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498fb80 INFO: task kworker/1:46:3226 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:3228 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:3228 tgid:3228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc71d84 r8:00000002 r7:60000113 r6:dfc71d8c r5:83a95400 r4:83a95400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a95400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a2f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a95400 r7:00000000 r6:83018200 r5:00001000 r4:7f4b7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbf3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e5b8c r4:844e5800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e5b8c r4:84766b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a95400 r8:84766b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766b00 r8:8027ed34 r7:dfc61e60 r6:84766b80 r5:83a95400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994100 INFO: task kworker/1:47:3228 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3230 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:84240c00 r4:84240c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84240c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e10f80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84240c00 r7:00000000 r6:83018200 r5:00001000 r4:7f581000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed333000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e5f8c r4:844e5c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e5f8c r4:84766c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84240c00 r8:84766c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766c00 r8:8027ed34 r7:dfc61e60 r6:84766c80 r5:84240c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994440 INFO: task kworker/1:48:3230 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3233 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc91d84 r8:00000002 r7:60000113 r6:dfc91d8c r5:84242400 r4:84242400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84242400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84994a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84242400 r7:00000000 r6:83018200 r5:00001000 r4:7f57f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed20d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e638c r4:844e6000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e638c r4:84766d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84242400 r8:84766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766d00 r8:8027ed34 r7:dfc85e60 r6:84766d80 r5:84242400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc91fb0 to 0xdfc91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994680 INFO: task kworker/1:49:3233 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3235 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc9dd84 r8:00000002 r7:60000013 r6:dfc9dd8c r5:84243000 r4:84243000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84243000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e10140 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84243000 r7:00000000 r6:83018200 r5:00001000 r4:7f57d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf59000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e678c r4:844e6400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e678c r4:84766e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84243000 r8:84766e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766e00 r8:8027ed34 r7:dfc91e60 r6:84766e80 r5:84243000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc9dfb0 to 0xdfc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994880 INFO: task kworker/1:50:3235 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:51:3237 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfca9d84 r8:00000002 r7:60000113 r6:dfca9d8c r5:84243c00 r4:84243c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84243c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e10680 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f575000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc6d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e6f8c r4:844e6c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e6f8c r4:84766f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84243c00 r8:84766f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766f00 r8:8027ed34 r7:dfc9de60 r6:84766f80 r5:84243c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca9fb0 to 0xdfca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994a80 INFO: task kworker/1:51:3237 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3239 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcb5d84 r8:00000002 r7:60000113 r6:dfcb5d8c r5:84244800 r4:84244800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84244800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ed300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84244800 r7:00000000 r6:83018200 r5:00001000 r4:7f579000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcc9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e738c r4:844e7000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e738c r4:84991000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84244800 r8:8499102c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991000 r8:8027ed34 r7:dfca9e60 r6:84991080 r5:84244800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994c80 INFO: task kworker/1:52:3239 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3240 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcb9d84 r8:00000002 r7:60000113 r6:dfcb9d8c r5:84240000 r4:84240000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84240000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8498d280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84240000 r7:00000000 r6:83018200 r5:00001000 r4:7f57b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e6b8c r4:844e6800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e6b8c r4:84991100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84240000 r8:8499112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991100 r8:8027ed34 r7:dfcb5e60 r6:84991180 r5:84240000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb9fb0 to 0xdfcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994940 INFO: task kworker/1:53:3240 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3243 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcd5d84 r8:00000002 r7:60000013 r6:dfcd5d8c r5:84245400 r4:84245400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84245400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e10d40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84245400 r7:00000000 r6:83018200 r5:00001000 r4:7f577000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e778c r4:844e7400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e778c r4:84991200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84245400 r8:8499122c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991200 r8:8027ed34 r7:dfcb5e60 r6:84991280 r5:84245400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd5fb0 to 0xdfcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498d180 INFO: task kworker/1:54:3243 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3244 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3244 tgid:3244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbddd84 r8:00000002 r7:60000013 r6:dfbddd8c r5:84246000 r4:84246000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84246000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ef440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84246000 r7:00000000 r6:83018200 r5:00001000 r4:7f619000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed749000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85f21f8c r4:85f21c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85f21f8c r4:84991300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84246000 r8:8499132c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991300 r8:8027ed34 r7:dfcd5e60 r6:84991380 r5:84246000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498d180 INFO: task kworker/1:55:3244 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3246 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3246 tgid:3246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcddd84 r8:00000002 r7:60000113 r6:dfcddd8c r5:84241800 r4:84241800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84241800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85390c80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84241800 r7:00000000 r6:83018200 r5:00001000 r4:7f575000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd01000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e8bf8c r4:85e8bc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e8bf8c r4:84991400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84241800 r8:8499142c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991400 r8:8027ed34 r7:dfbdde60 r6:84991480 r5:84241800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498d0c0 INFO: task kworker/1:56:3246 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3248 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcf5d84 r8:00000002 r7:60000113 r6:dfcf5d8c r5:84518000 r4:84518000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84518000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29940 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84518000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb89000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a82f8c r4:85a82c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a82f8c r4:8497e180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84518000 r8:8497e1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e180 r8:8027ed34 r7:dfb4de60 r6:84991500 r5:84518000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf5fb0 to 0xdfcf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed240 INFO: task kworker/0:17:3248 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3250 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:84519800 r4:84519800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84519800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84519800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8438c r4:85a84000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8438c r4:8497e200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84519800 r8:8497e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e200 r8:8027ed34 r7:dfcf5e60 r6:84991580 r5:84519800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd05fb0 to 0xdfd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed400 INFO: task kworker/0:18:3250 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3251 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd09d84 r8:00000002 r7:60000113 r6:dfd09d8c r5:8451a400 r4:8451a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8451a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8451a400 r7:00000000 r6:83018000 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8338c r4:85a83000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8338c r4:8497e280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8451a400 r8:8497e2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e280 r8:8027ed34 r7:dfd05e60 r6:84991600 r5:8451a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd09fb0 to 0xdfd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed400 INFO: task kworker/0:19:3251 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3253 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd11d84 r8:00000002 r7:60000113 r6:dfd11d8c r5:8451bc00 r4:8451bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8451bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8451bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8378c r4:85a83400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8378c r4:8497e300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8451bc00 r8:8497e32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e300 r8:8027ed34 r7:dfd05e60 r6:84991680 r5:8451bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd11fb0 to 0xdfd11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed540 INFO: task kworker/0:20:3253 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3254 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3254 tgid:3254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd21d84 r8:00000002 r7:60000113 r6:dfd21d8c r5:8451c800 r4:8451c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8451c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29c80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8451c800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb60d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a83b8c r4:85a83800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a83b8c r4:8497e380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8451c800 r8:8497e3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e380 r8:8027ed34 r7:dfd05e60 r6:84991700 r5:8451c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd21fb0 to 0xdfd21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed540 INFO: task kworker/0:21:3254 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3258 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc41d84 r8:00000002 r7:60000013 r6:dfc41d8c r5:83a73000 r4:83a73000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a73000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29d80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a73000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb81d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a83f8c r4:85a83c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a83f8c r4:8497e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a73000 r8:8497e42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e400 r8:8027ed34 r7:dfd05e60 r6:8497e480 r5:83a73000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed780 INFO: task kworker/0:22:3258 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:3260 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:3260 tgid:3260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd41d84 r8:00000002 r7:60000113 r6:dfd41d8c r5:84518c00 r4:84518c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84518c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84760080 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84518c00 r7:00000000 r6:83018200 r5:00001000 r4:7f61b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed83f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85f2238c r4:85f22000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85f2238c r4:84991780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84518c00 r8:849917ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991780 r8:8027ed34 r7:dfbdde60 r6:84991800 r5:84518c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd41fb0 to 0xdfd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498d180 INFO: task kworker/1:57:3260 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:3264 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd35d84 r8:00000002 r7:60000013 r6:dfd35d8c r5:8451d400 r4:8451d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8451d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847604c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8451d400 r7:00000000 r6:83018200 r5:00001000 r4:7f617000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd51000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85f21b8c r4:85f21800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85f21b8c r4:84991880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8451d400 r8:849918ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991880 r8:8027ed34 r7:dfbdde60 r6:84991900 r5:8451d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd35fb0 to 0xdfd35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994b40 INFO: task kworker/1:58:3264 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:59:3265 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:59 state:D stack:0 pid:3265 tgid:3265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcd9d84 r8:00000002 r7:60000013 r6:dfcd9d8c r5:8451e000 r4:8451e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8451e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854efac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8451e000 r7:00000000 r6:83018200 r5:00001000 r4:7f615000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2c9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85f2178c r4:85f21400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85f2178c r4:84991980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8451e000 r8:849919ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991980 r8:8027ed34 r7:dfd35e60 r6:84991a00 r5:8451e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd9fb0 to 0xdfcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498d4c0 INFO: task kworker/1:59:3265 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:3267 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:3267 tgid:3267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd5dd84 r8:00000002 r7:60000113 r6:dfd5dd8c r5:8451ec00 r4:8451ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8451ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ef2c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8451ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f613000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd49000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85f2138c r4:85f21000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85f2138c r4:84991a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8451ec00 r8:84991aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991a80 r8:8027ed34 r7:dfcd9e60 r6:84991b00 r5:8451ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd5dfb0 to 0xdfd5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847601c0 INFO: task kworker/1:60:3267 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3269 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3269 tgid:3269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd75d84 r8:00000002 r7:60000113 r6:dfd75d8c r5:83a94800 r4:83a94800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a94800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d4b900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a94800 r7:00000000 r6:83018200 r5:00001000 r4:7f6a3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee52b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85fb378c r4:85fb3400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85fb378c r4:84991b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a94800 r8:84991bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991b80 r8:8027ed34 r7:dfd5de60 r6:84991c00 r5:83a94800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd75fb0 to 0xdfd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84760100 INFO: task kworker/1:61:3269 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:62:3270 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:62 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd79d84 r8:00000002 r7:60000013 r6:dfd79d8c r5:84246c00 r4:84246c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84246c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eff80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84246c00 r7:00000000 r6:83018200 r5:00001000 r4:7f611000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed887000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ea178c r4:85ea1400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ea178c r4:84991c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84246c00 r8:84991cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991c80 r8:8027ed34 r7:dfd75e60 r6:84991d00 r5:84246c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd79fb0 to 0xdfd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84760100 INFO: task kworker/1:62:3270 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3273 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3273 tgid:3273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd91d84 r8:00000002 r7:60000113 r6:dfd91d8c r5:849e9800 r4:849e9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaad000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8478c r4:85a84400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8478c r4:8497e500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e9800 r8:8497e52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e500 r8:8027ed34 r7:dfd05e60 r6:84991d80 r5:849e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd91fb0 to 0xdfd91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847edc40 INFO: task kworker/0:23:3273 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:63:3274 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:63 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd9dd84 r8:00000002 r7:60000113 r6:dfd9dd8c r5:849e8000 r4:849e8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d4b100 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f697000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee4ef000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85fb238c r4:85fb2000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85fb238c r4:84991e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e8000 r8:84991e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991e00 r8:8027ed34 r7:dfd75e60 r6:84991e80 r5:849e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd9dfb0 to 0xdfd9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84760200 INFO: task kworker/1:63:3274 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3275 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3275 tgid:3275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfda5d84 r8:00000002 r7:60000013 r6:dfda5d8c r5:849eb000 r4:849eb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849eb000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596df80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec691000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a84f8c r4:85a84c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a84f8c r4:8497e580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849eb000 r8:8497e5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e580 r8:8027ed34 r7:dfd91e60 r6:84991f00 r5:849eb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda5fb0 to 0xdfda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847edd40 INFO: task kworker/0:24:3275 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3279 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3279 tgid:3279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfdb9d84 r8:00000002 r7:60000113 r6:dfdb9d8c r5:849ea400 r4:849ea400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849ea400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdb9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b47040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6eb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8538c r4:85a85000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8538c r4:8497e680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ea400 r8:8497e6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e680 r8:8027ed34 r7:dfdb5e60 r6:849b0000 r5:849ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdb9fb0 to 0xdfdb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ede40 INFO: task kworker/0:26:3279 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:64:3281 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:64 state:D stack:0 pid:3281 tgid:3281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfdcdd84 r8:00000002 r7:60000113 r6:dfdcdd8c r5:849e8c00 r4:849e8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849e8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdcde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d4ba00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:849e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f6a5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee537000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85fb3b8c r4:85fb3800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85fb3b8c r4:849b0080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e8c00 r8:849b00ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b0080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b0080 r8:8027ed34 r7:dfd75e60 r6:849b0100 r5:849e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdcdfb0 to 0xdfdcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84760e00 INFO: task kworker/1:64:3281 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3283 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3283 tgid:3283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfdddd84 r8:00000002 r7:60000113 r6:dfdddd8c r5:849ec800 r4:849ec800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849ec800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfddde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b47280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec72f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8578c r4:85a85400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8578c r4:8497e700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ec800 r8:8497e72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e700 r8:8027ed34 r7:dfdb5e60 r6:849b0180 r5:849ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdddfb0 to 0xdfdddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed180 INFO: task kworker/0:27:3283 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3285 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3285 tgid:3285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfde5d84 r8:00000002 r7:60000113 r6:dfde5d8c r5:849eec00 r4:849eec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849eec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfde5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b47380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec765000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a85b8c r4:85a85800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a85b8c r4:8497e780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849eec00 r8:8497e7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e780 r8:8027ed34 r7:dfdb5e60 r6:849b0200 r5:849eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfde5fb0 to 0xdfde5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847eda40 INFO: task kworker/0:28:3285 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3287 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfdf5d84 r8:00000002 r7:60000113 r6:dfdf5d8c r5:849ee000 r4:849ee000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:849ee000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdf5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b47480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:849ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec891000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a85f8c r4:85a85c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a85f8c r4:8497e800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ee000 r8:8497e82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e800 r8:8027ed34 r7:dfdb5e60 r6:849b0280 r5:849ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdf5fb0 to 0xdfdf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84948040 INFO: task kworker/0:29:3287 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3288 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3288 tgid:3288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd69d84 r8:00000002 r7:60000013 r6:dfd69d8c r5:84488c00 r4:84488c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84488c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b47580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84488c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8c5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8638c r4:85a86000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8638c r4:8497e880 r4:8497e880 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r5:00001000 r4:ec967000 r4:8497ea00 Exception stack(0xdfe01fb0 to 0xdfe01ff8) Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:65:3294 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:65 state:D stack:0 pid:3294 tgid:3294 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd8dd84 r8:00000002 r7:60000113 r6:dfd8dd8c r5:8448a400 r4:8448a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8448a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d4b7c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8448a400 r7:00000000 r6:83018200 r5:00001000 r4:7f6a1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee51f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85fb338c r4:85fb3000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85fb338c r4:849b0300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448a400 r8:849b032c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b0300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b0300 r8:8027ed34 r7:dfd75e60 r6:8497eb00 r5:8448a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd8dfb0 to 0xdfd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a02140 INFO: task kworker/1:65:3294 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:66:3295 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:66 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:8448b000 r4:8448b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8448b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d4b6c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8448b000 r7:00000000 r6:83018200 r5:00001000 r4:7f69f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee517000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85fb2f8c r4:85fb2c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85fb2f8c r4:849b0380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448b000 r8:849b03ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b0380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b0380 r8:8027ed34 r7:dfd8de60 r6:8497eb80 r5:8448b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa51fb0 to 0xdfa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a022c0 INFO: task kworker/1:66:3295 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:847cce40 Workqueue: events bpf_prog_free_deferred r4:8448bc00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfe0de08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:ee543000 r7:ddde2d40 r6:83018200 r5:85fb3f8c r4:849b0400 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r5:00001000 r4:ee903000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:68 state:D stack:0 pid:3302 tgid:3302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:8448c800 r4:8448c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8448c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d4bd00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8448c800 r7:00000000 r6:83018200 r5:00001000 r4:7f6ab000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee55b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85fbc78c r4:85fbc400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85fbc78c r4:849b0480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8448c800 r8:849b04ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b0480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b0480 r8:8027ed34 r7:dfe0de60 r6:8497ec80 r5:8448c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a02700 INFO: task kworker/1:68:3302 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:e0721dc0 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:dfac5d84 r8:00000002 r7:60000113 r6:dfac5d8c r5:8448ec00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d4bf40 r7:ddde2d40 r6:83018200 r5:85fbcf8c r4:849b0580 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:71:3309 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:71 state:D stack:0 pid:3309 tgid:3309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa71d84 r8:00000002 r7:60000113 r6:dfa71d8c r5:84969800 r4:84969800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84969800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r5:8602278c r4:86022400 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 Not tainted 6.15.0-syzkaller #0 r4:84968000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d54000 r5:85fbd78c r4:85fbd400 r10:00000000 r9:849b0700 r8:8027ed34 r7:dfa71e60 r6:849b0780 r5:84968000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a02dc0 INFO: task kworker/1:72:3311 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:73:3313 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d2b440 r5:85fbe38c r4:85fbe000 r4:849b0800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r5:8602278c r4:86022400 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:847cce40 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d2b040 r5:85fbdb8c r4:85fbd800 r10:00000000 r9:849b0900 r8:8027ed34 r7:dfadde60 r6:849b0980 r5:8496b000 r4:84a02f00 Call trace: 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:75:3317 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:75 state:D stack:0 pid:3317 tgid:3317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb1dd84 r8:00000002 r7:60000113 r6:dfb1dd8c r5:8496bc00 r4:8496bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d2b340 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8496bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f617000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7fb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85fbdf8c r4:85fbdc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85fbdf8c r4:849b0a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496bc00 r8:849b0a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b0a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b0a00 r8:8027ed34 r7:dfadde60 r6:849b0a80 r5:8496bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb1dfb0 to 0xdfb1dff8) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:76:3319 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:76 state:D stack:0 pid:3319 tgid:3319 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb31d84 r8:00000002 r7:60000113 r6:dfb31d8c r5:8496c800 r4:8496c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d2b540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8496c800 r7:00000000 r6:83018200 r5:00001000 r4:7f61b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda07000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85fbe78c r4:85fbe400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85fbe78c r4:849b0b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8496c800 r8:849b0b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b0b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b0b00 r8:8027ed34 r7:dfadde60 r6:849b0b80 r5:8496c800 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 Exception stack(0xe0721fb0 to 0xe0721ff8) Not tainted 6.15.0-syzkaller #0 r5:8496d400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:78:3323 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:78 state:D stack:0 pid:3323 tgid:3323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:8496e000 r4:8496e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8496e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d2b640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8496e000 r7:00000000 r6:83018200 r5:00001000 r4:7f61d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda75000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8602278c r4:86022400 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 INFO: task kworker/1:79:3325 blocked for more than 452 seconds. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85fbef8c r4:85fbec00 r4:849b0e00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:e0721dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 INFO: task kworker/1:224:3809 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3380 r5:85054f8c r4:85054c00 r10:00000000 r9:847c6c00 r8:8027ed34 r7:e0699e60 r6:847da380 r5:84beec00 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847c6f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847c6f80 r8:8027ed34 r7:e06d9e60 r6:847da800 r5:85009800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0765fb0 to 0xe0765ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ac640 INFO: task kworker/0:136:3832 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:228:3840 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:228 state:D stack:0 pid:3840 tgid:3840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0059d84 r8:00000002 r7:60000013 r6:e0059d8c r5:8500d400 r4:8500d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8500d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0059e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fe40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500d400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb0d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85013b8c r4:85013800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85013b8c r4:847da980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500d400 r8:847da9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da980 r8:8027ed34 r7:e06b9e60 r6:847daa00 r5:8500d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r5:8602278c r4:86022400 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 task:kworker/0:137 state:D stack:0 pid:3842 tgid:3842 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:229:3843 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:229 state:D stack:0 pid:3843 tgid:3843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0789d84 r8:00000002 r7:60000113 r6:e0789d8c r5:85080c00 r4:85080c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85080c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0789e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cc900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85080c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbbb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844d1f8c r4:844d1c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844d1f8c r4:847dab00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85080c00 r8:847dab2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847dab00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0789fb0 to 0xe0789ff8) task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85081800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85081800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e078de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497f140 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85081800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb7b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85013f8c r4:85013c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85013f8c r4:847dac00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85081800 r8:847dac2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847dac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847dac00 r8:8027ed34 r7:e0789e60 r6:847dac80 r5:85081800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe078dfb0 to 0xe078dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f300 INFO: task kworker/1:230:3844 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:231:3847 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0775e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0c8c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85083000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe05000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501838c r4:85018000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501838c r4:847dad00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85083000 r8:847dad2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847dad00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847dad00 r8:8027ed34 r7:e0789e60 r6:847dad80 r5:85083000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:00001000 r4:ee903000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a9e08 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06a9fb0 to 0xe06a9ff8) task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 Exception stack(0xe0721fb0 to 0xe0721ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:233:3851 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:233 state:D stack:0 pid:3851 tgid:3851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06a5d84 r8:00000002 r7:60000013 r6:e06a5d8c r5:85084800 r4:85084800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85084800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e03c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85084800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe7d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85018b8c r4:85018800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85018b8c r4:847daf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85084800 r8:847daf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847daf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847daf00 r8:8027ed34 r7:e06a9e60 r6:847daf80 r5:85084800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a5fb0 to 0xe06a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849e0080 INFO: task kworker/1:233:3851 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r5:00001000 r4:ee903000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e04c0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r5:00001000 r4:ee903000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85086000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 Exception stack(0xe0721fb0 to 0xe0721ff8) r4:847cce40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07a1d84 r8:00000002 r7:60000013 r6:e07a1d8c r5:85086c00 r4:85086c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85086c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e07c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85086c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff8f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501978c r4:85019400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501978c r4:849b7200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85086c00 r8:849b722c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b7200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7200 r8:8027ed34 r7:e0795e60 r6:849b7280 r5:85086c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07a1fb0 to 0xe07a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849e0440 INFO: task kworker/1:236:3857 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:237:3859 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:237 state:D stack:0 pid:3859 tgid:3859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07add84 r8:00000002 r7:60000013 r6:e07add8c r5:85082400 r4:85082400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85082400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e0940 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85082400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85019b8c r4:85019800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85019b8c r4:849b7300 r10:61c88647 r9:85082400 r8:849b732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849e05c0 Call trace: 1d60: 80070013 ffffffff [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8602278c r4:86022400 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:238:3861 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:238 state:D stack:0 pid:3861 tgid:3861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07b1d84 r8:00000002 r7:60000113 r6:e07b1d8c r5:85000c00 r4:85000c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85000c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e0ac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85000c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85019f8c r4:85019c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85019f8c r4:849b7400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85000c00 r8:849b742c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b7400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7400 r8:8027ed34 r7:e07ade60 r6:849b7480 r5:85000c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:847da580 Exception stack(0xe0721fb0 to 0xe0721ff8) Not tainted 6.15.0-syzkaller #0 r5:8500e000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8501a38c r4:8501a000 r10:00000000 r9:849b7500 r8:8027ed34 r7:e07b1e60 r6:849b7580 r5:8500e000 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 Exception stack(0xe0721fb0 to 0xe0721ff8) Not tainted 6.15.0-syzkaller #0 r5:85088000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e0b00 r7:ddde2d40 r6:83018200 r5:8501a78c r4:849b7600 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:241:3867 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:241 state:D stack:0 pid:3867 tgid:3867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07bdd84 r8:00000002 r7:60000113 r6:e07bdd8c r5:85088c00 r4:85088c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85088c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07bde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e0f80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85088c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e003f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501ab8c r4:8501a800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501ab8c r4:849b7700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85088c00 r8:849b772c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b7700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7700 r8:8027ed34 r7:e07b9e60 r6:849b7780 r5:85088c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07bdfb0 to 0xe07bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849e0d80 INFO: task kworker/1:241:3867 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r5:8602278c r4:86022400 r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe07cdfb0 to 0xe07cdff8) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r5:8602278c r4:86022400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:243:3871 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:243 state:D stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07d1d84 r8:00000002 r7:60000013 r6:e07d1d8c r5:8508a400 r4:8508a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8508a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b9340 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8508a400 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0449000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501b78c r4:8501b400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501b78c r4:849b7900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508a400 r8:849b792c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b7900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7900 r8:8027ed34 r7:e07cde60 r6:849b7980 r5:8508a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d1fb0 to 0xe07d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b90c0 INFO: task kworker/1:243:3871 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 r4:00000000 r5:00001000 r4:ee903000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847cce40 Workqueue: events bpf_prog_free_deferred [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d5e08 r5:00001000 r4:e0433000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8501b38c r4:849b7a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508b000 r8:849b7a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b7a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7a00 r8:8027ed34 r7:e07d1e60 r6:849b7a80 r5:8508b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d5fb0 to 0xe07d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b9280 INFO: task kworker/1:244:3873 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:847cce40 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d9e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e0469000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e1e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:849b7c00 r8:8027ed34 r7:e07d9e60 r6:849b7c80 r5:8508d400 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:247:3878 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:247 state:D stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07e5d84 r8:00000002 r7:60000013 r6:e07e5d8c r5:8508e000 r4:8508e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8508e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b97c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8508e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05af000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501bf8c r4:8501bc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501bf8c r4:849b7d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508e000 r8:849b7d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b7d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7d00 r8:8027ed34 r7:e07e1e60 r6:849b7d80 r5:8508e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b9700 INFO: task kworker/1:247:3878 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:8508c800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e9e08 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r9:83018205 r8:8508c800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r10:61c88647 r9:8508c800 r8:849b7e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r5:00001000 r4:ee903000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:249 state:D stack:0 pid:3882 tgid:3882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07edd84 r8:00000002 r7:60000013 r6:e07edd8c r5:85090c00 r4:85090c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85090c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b9ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85090c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e063f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85028f8c r4:85028c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85028f8c r4:849b7f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85090c00 r8:849b7f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:849b7f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b7f00 r8:8027ed34 r7:e07e9e60 r6:849b7f80 r5:85090c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07edfb0 to 0xe07edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b94c0 INFO: task kworker/1:249:3882 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd8d4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85090000 r8:847ba02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847b9bc0 INFO: task kworker/1:250:3885 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd8d4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8502938c r4:85029000 r4:847ba100 Exception stack(0xe07f5fb0 to 0xe07f5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0721d20 to 0xe0721d68) r4:e0721dc0 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:252:3889 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:252 state:D stack:0 pid:3889 tgid:3889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07f1d84 r8:00000002 r7:60000113 r6:e07f1d8c r5:85093000 r4:85093000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85093000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c5040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85093000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07bf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502978c r4:85029400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502978c r4:847ba200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85093000 r8:847ba22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ba200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba200 r8:8027ed34 r7:e07f5e60 r6:847ba280 r5:85093000 Exception stack(0xe07f1fb0 to 0xe07f1ff8) task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da580 Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:253:3891 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:253 state:D stack:0 pid:3891 tgid:3891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e07f9d84 r8:00000002 r7:60000013 r6:e07f9d8c r5:85093c00 r4:85093c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85093c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c5380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85093c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4801000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85029b8c r4:85029800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85029b8c r4:847ba300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85093c00 r8:847ba32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ba300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba300 r8:8027ed34 r7:e07f1e60 r6:847ba380 r5:85093c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 r4:e0721dc0 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0721fb0 to 0xe0721ff8) r4:847cce40 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c56c0 r7:ddde2d40 r6:83018200 r5:8502a38c r4:847ba400 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:255:3895 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:255 state:D stack:0 pid:3895 tgid:3895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e4811d84 r8:00000002 r7:60000113 r6:e4811d8c r5:85095400 r4:85095400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85095400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4811e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847c54c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85095400 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e480d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85029f8c r4:85029c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85029f8c r4:847ba500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85095400 r8:847ba52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ba500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ba500 r8:8027ed34 r7:e4805e60 r6:847ba580 r5:85095400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4811fb0 to 0xe4811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c5340 INFO: task kworker/1:255:3895 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd8d4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0721dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ead80 r7:ddde2d40 r6:83018200 r5:8502b38c r4:847ba600 r10:00000000 r9:847ba600 r8:8027ed34 r7:e4805e60 r6:8498e080 r5:84a89800 Exception stack(0xe4821fb0 to 0xe4821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c5340 INFO: task kworker/1:256:3896 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd8d4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:257:3900 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:257 state:D stack:0 pid:3900 tgid:3900 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e047dd84 r8:00000002 r7:60000013 r6:e047dd8c r5:84a8b000 r4:84a8b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a8b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e047de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847eaa80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a8b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502ab8c r4:8502a800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502ab8c r4:847ba680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8b000 r8:847ba6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ba680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:847cce40 task:kworker/0:138 state:D stack:0 pid:3902 tgid:3902 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:dfa31000 r10:61c88647 r9:84a8bc00 r8:8498e22c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:82ac11e4 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:139:3904 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:139 state:D stack:0 pid:3904 tgid:3904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e06c9d84 r8:00000002 r7:60000013 r6:e06c9d8c r5:84a8c800 r4:84a8c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a8c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3980 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a8c800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc25000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505578c r4:85055400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505578c r4:8498e180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8c800 r8:8498e1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8498e180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8498e180 r8:8027ed34 r7:e481de60 r6:8498e300 r5:84a8c800 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a8d400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:84a8d400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc87000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85055f8c r4:85055c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85055f8c r4:8498e380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8d400 r8:8498e3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8498e380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:e0721dc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:dfc57000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0749fb0 to 0xe0749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d3800 INFO: task kworker/0:141:3908 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd8d4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:dfcbf000 r10:61c88647 r9:84a8ec00 r8:8498e5ac r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0721fb0 to 0xe0721ff8) Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:dfced000 r7:dddced40 r6:83018000 r5:8505678c r4:8498e680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a88000 r8:8498e6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8498e680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8498e680 r8:8027ed34 r7:e484de60 r6:8498e700 r5:84a88000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4851fb0 to 0xe4851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d3b40 INFO: task kworker/0:143:3912 is blocked on a mutex likely owned by task kworker/1:226:3826. 1d60: 80070013 ffffffff [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0cfc0 r9:83018005 r8:84a8a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd17000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85056b8c r4:85056800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85056b8c r4:8498e780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a8a400 r8:8498e7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8498e780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8498e780 r8:8027ed34 r7:e4851e60 r6:8498e800 r5:84a8a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4855fb0 to 0xe4855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:dfdeb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85057b8c r4:85057800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85057b8c r4:8498e880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a88c00 r8:8498e8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8498e880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8498e880 r8:8027ed34 r7:e4855e60 r6:8498e900 r5:84a88c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4859fb0 to 0xe4859ff8) Workqueue: events bpf_prog_free_deferred r4:e0721dc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:61c88647 r9:84a28000 r8:8498e9ac r7:82804d40 r6:dddced40 r5:dddced60 1d20: bd8d4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:dfd7b000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd8d4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:ee903000 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r7:dddced40 r6:83018000 r5:8505778c r4:8498eb00 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:847cce40 r10:829187f4 r9:e487dd84 r8:00000002 r7:60000113 r6:e487dd8c r5:85098000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:e0515000 r10:00000000 r9:8498eb80 r8:8027ed34 r7:e4859e60 r6:847ba800 r5:85098000 r4:847b5200 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:150:3925 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:150 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8885d84 r8:00000002 r7:60000113 r6:e8885d8c r5:85098c00 r4:85098c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85098c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8885e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b5640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85098c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0031000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85057f8c r4:85057c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85057f8c r4:8498ec00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85098c00 r8:8498ec2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8498ec00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8498ec00 r8:8027ed34 r7:e487de60 r6:847ba880 r5:85098c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8885fb0 to 0xe8885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b5200 INFO: task kworker/0:150:3925 is blocked on a mutex likely owned by task kworker/1:226:3826. r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:151 state:D stack:0 pid:3927 tgid:3927 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e888dd84 r8:00000002 r7:60000013 r6:e888dd8c r5:8509a400 r4:8509a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8509a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e888de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b5780 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8509a400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00bf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8498ec80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0721d20 to 0xe0721d68) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84a28c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:00001000 r4:e047f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a28c00 r8:8498ed2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8498ed00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8498ed00 r8:8027ed34 r7:e487de60 r6:8498ed80 r5:84a28c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4865fb0 to 0xe4865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b5600 INFO: task kworker/0:152:3929 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd8d4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:153:3932 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:153 state:D stack:0 pid:3932 tgid:3932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e8891d84 r8:00000002 r7:60000113 r6:e8891d8c r5:84a29800 r4:84a29800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a29800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8891e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b5a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a29800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e049b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506078c r4:85060400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe8891fb0 to 0xe8891ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:e0721dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r5:8602278c r4:86022400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Call trace: r5:84a2a400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4861e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85060b8c r4:8498ef00 r10:61c88647 r9:84a2a400 r8:8498ef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8498ef00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8498ef00 r8:8027ed34 r7:e487de60 r6:8498ef80 r5:84a2a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4861fb0 to 0xe4861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b5900 INFO: task kworker/0:154:3933 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd8d4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:847da580 Not tainted 6.15.0-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r5:8602278c r4:86022400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:156:3938 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:156 state:D stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e88a1d84 r8:00000002 r7:60000013 r6:e88a1d8c r5:84a2bc00 r4:84a2bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88a1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b5e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a2bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506138c r4:85061000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506138c r4:849a1100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2bc00 r8:849a112c r7:82804d40 r6:dddced40 r5:dddced60 r4:849a1100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a1100 r8:8027ed34 r7:e8899e60 r6:849a1180 r5:84a2bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88a1fb0 to 0xe88a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b5c40 INFO: task kworker/0:156:3938 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0721fb0 to 0xe0721ff8) Not tainted 6.15.0-syzkaller #0 r4:84a2c800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:e0645000 r10:61c88647 r9:84a2c800 r8:849a122c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:e0721dc0 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:e074dd84 r8:00000002 r7:60000013 r6:e074dd8c r5:8509b000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:8509b000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:8502af8c r4:8502ac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502af8c r4:847baa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509b000 r8:847baa2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847baa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847baa00 r8:8027ed34 r7:e4821e60 r6:847baa80 r5:8509b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe074dfb0 to 0xe074dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ea9c0 INFO: task kworker/1:258:3944 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd8d4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 Exception stack(0xe0721fb0 to 0xe0721ff8) Not tainted 6.15.0-syzkaller #0 r5:8509bc00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:dfa89000 r10:61c88647 r9:8509bc00 r8:849a132c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd8d4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0721fb0 to 0xe0721ff8) r4:8509d400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000001 Workqueue: events bpf_prog_free_deferred [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:8502bb8c r4:847bac80 Exception stack(0xe88b1fb0 to 0xe88b1ff8) task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0721dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:261 state:D stack:0 pid:3952 tgid:3952 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502bf8c r4:8502bc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502bf8c r4:847bad80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509ec00 r8:847badac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847bad80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847bad80 r8:8027ed34 r7:e88b1e60 r6:847bae00 r5:8509ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88b5fb0 to 0xe88b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847eaec0 INFO: task kworker/1:261:3952 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd8d4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:847da580 Not tainted 6.15.0-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503438c r4:85034000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503438c r4:847bae80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509c800 r8:847baeac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847bae80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847bae80 r8:8027ed34 r7:e88b5e60 r6:847baf00 r5:8509c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88b9fb0 to 0xe88b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:847cce40 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r7:ddde2d40 r6:83018200 r5:844d178c r4:847baf80 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84996740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85034b8c r4:85034800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85034b8c r4:847ef080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a0000 r8:847ef0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ef080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ef080 r8:8027ed34 r7:e88b9e60 r6:847ef100 r5:850a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88a9fb0 to 0xe88a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0721d20 to 0xe0721d68) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/1:265:3961 blocked for more than 453 seconds. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849965c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff91000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503478c r4:85034400 r4:847ef180 Workqueue: events bpf_prog_free_deferred [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:266:3964 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:266 state:D stack:0 pid:3964 tgid:3964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e88c1d84 r8:00000002 r7:60000113 r6:e88c1d8c r5:850a2400 r4:850a2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:61c88647 r9:850a2400 r8:847ef2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ef280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ef280 r8:8027ed34 r7:e88a9e60 r6:847ef300 r5:850a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88c1fb0 to 0xe88c1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) INFO: task kworker/1:267:3965 blocked for more than 453 seconds. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r7:ddde2d40 r6:83018200 r5:8503538c r4:847ef380 Workqueue: events bpf_prog_free_deferred [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:847cce40 Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e88cdd84 r8:00000002 r7:60000013 r6:e88cdd8c r5:850a4800 r4:850a4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84996dc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0429000 r5:8503578c r4:85035400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e0721dc0 r4:00000001 task:kworker/1:269 state:D stack:0 pid:3971 tgid:3971 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:850a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:847cce40 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0721d20 to 0xe0721d68) r5:00001000 r4:ee903000 1fa0: 00000000 00000000 00000000 00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:847ef800 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:272 state:D stack:0 pid:3977 tgid:3977 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0721dc0 r4:847da580 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:273:3979 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:273 state:D stack:0 pid:3979 tgid:3979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:850ab000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e5940 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e0721dc0 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 task:kworker/1:274 state:D stack:0 pid:3981 tgid:3981 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:850a8c00 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea909e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e58c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2d400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8503778c r4:85037400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8503778c r4:847efd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2d400 r8:847efdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847efd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847efd80 r8:8027ed34 r7:e88f5e60 r6:849a1500 r5:84a2d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea909fb0 to 0xea909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849e5c40 INFO: task kworker/1:277:3986 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd8d4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 r5:80070013 r4:80239bd0 r4:e0721dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:3988 tgid:3988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea911d84 r8:00000002 r7:60000013 r6:ea911d8c r5:84a2e000 r4:84a2e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea911e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e5e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849e5b80 INFO: task kworker/1:278:3988 is blocked on a mutex likely owned by task kworker/1:226:3826. r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:61c88647 r9:84ac8000 r8:849a162c r7:82804d40 r6:dddced40 r5:dddced60 r4:82ac11e4 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:849e5e80 r4:e0721dc0 Exception stack(0xe0721fb0 to 0xe0721ff8) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) Exception stack(0xea919fb0 to 0xea919ff8) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849de0c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aca400 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e076b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85040b8c r4:85040800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85040b8c r4:847eff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aca400 r8:847effac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847eff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847eff80 r8:8027ed34 r7:ea919e60 r6:849a1800 r5:84aca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea91dfb0 to 0xea91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849e5d40 INFO: task kworker/1:281:3997 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84acb000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) Exception stack(0xea921fb0 to 0xea921ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849de100 INFO: task kworker/1:282:3999 is blocked on a mutex likely owned by task kworker/1:226:3826. 1d60: 80070013 ffffffff r5:8602278c r4:86022400 Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:4001 blocked for more than 453 seconds. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Call trace: r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:847cce40 r5:84acc800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea929e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849de780 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84acc800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea933000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 r4:e0721dc0 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1d60: 80070013 ffffffff [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84ace000 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849de3c0 INFO: task kworker/1:286:4007 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 r5:8602278c r4:86022400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea931fb0 to 0xea931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84959640 INFO: task kworker/0:162:4008 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 task:kworker/1:287 state:D stack:0 pid:4011 tgid:4011 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r7:ddde2d40 r6:83018200 r5:8504238c r4:84799280 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8602278c r4:86022400 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:288:4013 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:8504278c r4:85042400 Exception stack(0xea951fb0 to 0xea951ff8) Call trace: r5:80070013 r4:80239bd0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 r7:ddde2d40 r6:83018200 r5:85042f8c r4:84799380 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:85042b8c r4:85042800 r4:849deb00 r5:80070013 r4:80239bd0 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:291:4021 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:850aec00 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000001 r4:00000000 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:292:4022 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:292 state:D stack:0 pid:4022 tgid:4022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e88f1d84 r8:00000002 r7:60000013 r6:e88f1d8c r5:850ae000 r4:850ae000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850ae000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84790040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8504338c r4:85043000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0721dc0 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 task:kworker/0:163 state:D stack:0 pid:4024 tgid:4024 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:84851800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 r4:00000001 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847cce40 r5:84853000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r5:85043b8c r4:85043800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0721dc0 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r7:ddde2d40 r6:83018200 r5:85043f8c r4:84799800 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:295:4030 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:295 state:D stack:0 pid:4030 tgid:4030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea985d84 r8:00000002 r7:60000013 r6:ea985d8c r5:84854800 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:84799880 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:829187f4 r9:ea989d84 r8:00000002 r7:60000113 r6:ea989d8c r5:84855400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84790700 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0721dc0 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84856000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd9f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bcb8c r4:850bc800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bcb8c r4:84799980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84856000 r8:847999ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84799980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799980 r8:8027ed34 r7:ea985e60 r6:8479f000 r5:84856000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea98dfb0 to 0xea98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790600 INFO: task kworker/1:297:4034 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 r5:00001000 r4:ee903000 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 r4:847da580 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:298:4036 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:298 state:D stack:0 pid:4036 tgid:4036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea991e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84856c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea991fb0 to 0xea991ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0721d20 to 0xe0721d68) r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 r4:847da580 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:299 state:D stack:0 pid:4038 tgid:4038 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84790c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84852400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00ad000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bd38c r4:850bd000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84799a80 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0721d20 to 0xe0721d68) r5:80070013 r4:80239bd0 r4:e0721dc0 r4:00000000 r5:00001000 r4:ee903000 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 r4:847da580 Exception stack(0xe0721fb0 to 0xe0721ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:300 state:D stack:0 pid:4040 tgid:4040 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea99de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84790d40 r5:00001000 r4:e00e9000 r5:850bd78c r4:850bd400 r10:61c88647 r9:84510c00 r8:84799b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:e0721dc0 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:4042 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:4042 tgid:4042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84512400 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:e0721dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847da580 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:847cce40 INFO: task kworker/1:302:4044 blocked for more than 454 seconds. task:kworker/1:302 state:D stack:0 pid:4044 tgid:4044 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 r5:00001000 r4:e04df000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84799c00 r8:8027ed34 r7:ea9b1e60 r6:8479f280 r5:84513c00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:4045 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:4045 tgid:4045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9bdd84 r8:00000002 r7:60000113 r6:ea9bdd8c r5:84511800 r4:84511800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84511800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84790f00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84511800 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0523000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850be38c r4:850be000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850be38c r4:84799c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84511800 r8:84799cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84799c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799c80 r8:8027ed34 r7:ea9b1e60 r6:8479f300 r5:84511800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9bdfb0 to 0xea9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84790a00 INFO: task kworker/1:303:4045 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:304:4047 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:304 state:D stack:0 pid:4047 tgid:4047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9c5d84 r8:00000002 r7:60000113 r6:ea9c5d8c r5:84514800 r4:84514800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84514800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b06c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84514800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ef000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84790d80 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 Exception stack(0xe0721fb0 to 0xe0721ff8) INFO: task kworker/1:305:4050 blocked for more than 454 seconds. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e0683000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850be78c r4:850be400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850be78c r4:84799d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84510000 r8:84799dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84799d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799d80 r8:8027ed34 r7:ea9c5e60 r6:8479f400 r5:84510000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d1fb0 to 0xea9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0080 INFO: task kworker/1:305:4050 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:306 state:D stack:0 pid:4051 tgid:4051 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b02c0 r5:850beb8c r4:850be800 r10:61c88647 r9:84516000 r8:84799e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0721d20 to 0xe0721d68) r4:e0721dc0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84513000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8887000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bef8c r4:850bec00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bef8c r4:84799e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84513000 r8:84799eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84799e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799e80 r8:8027ed34 r7:ea9c5e60 r6:8479f500 r5:84513000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9ddfb0 to 0xea9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0140 INFO: task kworker/1:307:4053 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:308:4056 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:308 state:D stack:0 pid:4056 tgid:4056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9edd84 r8:00000002 r7:60000113 r6:ea9edd8c r5:83ab1800 r4:83ab1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ab1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b0580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ab1800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea99f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bf38c r4:850bf000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850bf38c r4:84799f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab1800 r8:84799f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84799f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84799f00 r8:8027ed34 r7:ea9c5e60 r6:8479f580 r5:83ab1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9edfb0 to 0xea9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0240 INFO: task kworker/1:308:4056 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e0721dc0 r5:00001000 r4:ee903000 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:847cce40 task:kworker/1:309 state:D stack:0 pid:4058 tgid:4058 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b0840 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:847cce40 task:kworker/1:310 state:D stack:0 pid:4060 tgid:4060 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b0c80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85099800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa23000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c078c r4:850c0400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c078c r4:847d8000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85099800 r8:847d802c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d8000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d8000 r8:8027ed34 r7:ea9fde60 r6:847d8080 r5:85099800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea969fb0 to 0xea969ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0640 INFO: task kworker/1:310:4060 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:850aa400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:850bff8c r4:847d8100 Exception stack(0xea999fb0 to 0xea999ff8) r4:847b0640 Workqueue: events bpf_prog_free_deferred 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:850a6c00 r5:850a6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847b0b00 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c038c r4:850c0000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c038c r4:847d8200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a6c00 r8:847d822c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d8200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d8200 r8:8027ed34 r7:ea969e60 r6:847d8280 r5:850a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa15fb0 to 0xeaa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847b0a40 INFO: task kworker/1:312:4064 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:313:4068 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:313 state:D stack:0 pid:4068 tgid:4068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa21d84 r8:00000002 r7:60000113 r6:eaa21d8c r5:850a5400 r4:850a5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850a5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:847da580 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:314:4070 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:314 state:D stack:0 pid:4070 tgid:4070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa4dd84 r8:00000002 r7:60000113 r6:eaa4dd8c r5:850b0000 r4:850b0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850b0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e9040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa5f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c178c r4:850c1400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c178c r4:847d8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b0000 r8:847d842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d8400 r8:8027ed34 r7:eaa21e60 r6:847d8480 r5:850b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa4dfb0 to 0xeaa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478efc0 INFO: task kworker/1:314:4070 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:315:4071 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:315 state:D stack:0 pid:4071 tgid:4071 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:850b0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:850c0f8c r4:847d8500 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0721fb0 to 0xe0721ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:316:4072 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:316 state:D stack:0 pid:4072 tgid:4072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa5dd84 r8:00000002 r7:60000113 r6:eaa5dd8c r5:850b1800 r4:850b1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850b1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478e340 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:850b3000 r4:829187f0 r9:83018205 r8:850b3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e0721dc0 r5:8602278c r4:86022400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:318:4076 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:318 state:D stack:0 pid:4076 tgid:4076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa7dd84 r8:00000002 r7:60000113 r6:eaa7dd8c r5:850b4800 r4:850b4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850b4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e9440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c1b8c r4:850c1800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c1b8c r4:847d8800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b4800 r8:847d882c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d8800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d8800 r8:8027ed34 r7:eaa69e60 r6:847d8880 r5:850b4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa7dfb0 to 0xeaa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e9380 INFO: task kworker/1:318:4076 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:319:4079 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:319 state:D stack:0 pid:4079 tgid:4079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa8dd84 r8:00000002 r7:60000013 r6:eaa8dd8c r5:850b5400 r4:850b5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850b5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e9a40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa97000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c278c r4:850c2400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c278c r4:847d8900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b5400 r8:847d892c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d8900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d8900 r8:8027ed34 r7:eaa69e60 r6:847d8980 r5:850b5400 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:320:4081 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:320 state:D stack:0 pid:4081 tgid:4081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa81d84 r8:00000002 r7:60000013 r6:eaa81d8c r5:850b2400 r4:850b2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850b2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa81e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:164:4083 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:164 state:D stack:0 pid:4083 tgid:4083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:83ab2400 r5:83ab2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84951300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ab2400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe13000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:83ea078c r4:83ea0400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:83ea078c r4:8479f680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab2400 r8:8479f6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8479f680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479f680 r8:8027ed34 r7:e4845e60 r6:8479f700 r5:83ab2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa1fb0 to 0xeaaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:847dca00 r4:00000000 1d60: 80070013 ffffffff r4:e0721dc0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eaaa5d84 r8:00000002 r7:60000013 r6:eaaa5d8c r5:83ab0c00 r5:83ab0c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ab0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c338c r4:850c3000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c338c r4:847d8b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab0c00 r8:847d8b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d8b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d8b00 r8:8027ed34 r7:eaa8de60 r6:8479f780 r5:83ab0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e9840 INFO: task kworker/1:321:4084 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:e0721dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:83ab4800 r5:83ab4800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:83ab4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 r10:61c88647 r9:83ab4800 r8:847d8bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d8b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d8b80 r8:8027ed34 r7:eaaa5e60 r6:8479f800 r5:83ab4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa9fb0 to 0xeaaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e9840 INFO: task kworker/1:322:4085 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r5:83ab6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018205 r8:83ab6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 r10:61c88647 r9:83ab6000 r8:847d8c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d8c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d8c00 r8:8027ed34 r7:eaaa5e60 r6:8479f880 r5:83ab6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac1fb0 to 0xeaac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e9b80 INFO: task kworker/1:323:4088 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:e0721dc0 r5:8602278c r4:86022400 r4:00000001 task:kworker/1:324 state:D stack:0 pid:4089 tgid:4089 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:83ab6c00 r8:847d8cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d8c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d8c80 r8:8027ed34 r7:eaaa5e60 r6:8479f900 r5:83ab6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac5fb0 to 0xeaac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e9b80 INFO: task kworker/1:324:4089 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:83ab5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ab5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e9f80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83ab5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c3b8c r4:850c3800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850c3b8c r4:847d8d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ab5400 r8:847d8d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847d8d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847d8d00 r8:8027ed34 r7:eaac5e60 r6:8479f980 r5:83ab5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad1fb0 to 0xeaad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e9bc0 INFO: task kworker/1:325:4091 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:83ab3000 r4:829187f0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r5:84516c00 r4:829187f0 r4:00000000 r5:850cd78c r4:850cd400 r4:847e8100 r5:80070013 r4:80239bd0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:328 state:D stack:0 pid:4098 tgid:4098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab05d84 r8:00000002 r7:60000113 r6:eab05d8c r5:84515400 r4:84515400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84515400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e8380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84515400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84515400 r8:847d8eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0721dc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r5:84930000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:61c88647 r9:84930000 r8:847d8f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:82ac11e4 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:165:4103 blocked for more than 454 seconds. r5:84930c00 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:84930c00 r8:8479fc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8479fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479fc00 r8:8027ed34 r7:eaaa1e60 r6:8479fc80 r5:84930c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaedfb0 to 0xeaaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84954e40 INFO: task kworker/0:165:4103 is blocked on a mutex likely owned by task kworker/1:226:3826. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:00000001 task:kworker/0:166 state:D stack:0 pid:4105 tgid:4105 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r7:dddced40 r6:83018000 r5:83ea0b8c r4:8479fd00 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8602278c r4:86022400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea94dd84 r8:00000002 r7:60000013 r6:ea94dd8c r5:84932400 r4:84932400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84932400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea94de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84951640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84932400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507c78c r4:8507c400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507c78c r4:8479fe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84932400 r8:8479fe2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8479fe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479fe00 r8:8027ed34 r7:eaaa1e60 r6:8479fe80 r5:84932400 Call trace: r4:e0721dc0 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 task:kworker/0:168 state:D stack:0 pid:4109 tgid:4109 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dfe79000 r10:61c88647 r9:84933000 r8:8479ff2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8479ff00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8479ff00 r8:8027ed34 r7:ea94de60 r6:8479ff80 r5:84933000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa59fb0 to 0xeaa59ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:80070013 r4:80239bd0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84933c00 r4:829187f0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000000 r4:00000000 r4:847da580 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84935400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84935400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84951a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84935400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507cb8c r4:8507c800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507cb8c r4:849b5080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84935400 r8:849b50ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849b5080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b5080 r8:8027ed34 r7:ea94de60 r6:849b5100 r5:84935400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab19fb0 to 0xeab19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:331:4115 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:331 state:D stack:0 pid:4115 tgid:4115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84934800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab21e08 r5:00001000 r4:e071b000 r7:ddde2d40 r6:83018200 r5:850ccf8c r4:847df000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847e8840 INFO: task kworker/1:331:4115 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:850b6c00 r4:829187f0 r4:00000000 r5:8507cf8c r4:8507cc00 r4:00000001 Exception stack(0xeab25fb0 to 0xeab25ff8) INFO: task kworker/0:170:4117 is blocked on a mutex likely owned by task kworker/1:226:3826. r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:83ab3c00 r4:829187f0 r9:83018005 r8:83ab3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 r4:00000001 r4:84951a40 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0721dc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:172 state:D stack:0 pid:4121 tgid:4121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab35d84 r8:00000002 r7:60000113 r6:eab35d8c r5:85128000 r4:85128000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85128000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84951e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85128000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0441000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507d78c r4:8507d400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507d78c r4:849b5300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85128000 r8:849b532c r7:82804d40 r6:dddced40 r5:dddced60 r4:849b5300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b5300 r8:8027ed34 r7:eab2de60 r6:847df180 r5:85128000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab35fb0 to 0xeab35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84951900 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:173:4122 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85128c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r7:dddced40 r6:83018000 r5:8507f78c r4:849b5380 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab39fb0 to 0xeab39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84951900 INFO: task kworker/0:173:4122 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bdb82000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r5:00001000 r4:ee903000 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 Exception stack(0xe0721fb0 to 0xe0721ff8) r10:829187f4 r9:eab41d84 r8:00000002 r7:60000113 r6:eab41d8c r5:8512a400 r5:8512a400 r4:829187f0 r4:00000000 r7:dddced40 r6:83018000 r5:8507db8c r4:849b5400 Workqueue: events bpf_prog_free_deferred r4:e0721dc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85129800 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84951600 r9:83018005 r8:85129800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0609000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507df8c r4:8507dc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507df8c r4:849b5480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85129800 r8:849b54ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849b5480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b5480 r8:8027ed34 r7:eab39e60 r6:847df300 r5:85129800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab49fb0 to 0xeab49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84951fc0 INFO: task kworker/0:175:4126 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bf2cd000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r4:8512b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d0040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8512b000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0625000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507e38c r4:8507e000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507e38c r4:849b5500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512b000 r8:849b552c r7:82804d40 r6:dddced40 r5:dddced60 r4:849b5500 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da580 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:177 state:D stack:0 pid:4130 tgid:4130 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8512bc00 r4:829187f0 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d0280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8512bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0643000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507e78c r4:8507e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507e78c r4:849b5580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512bc00 r8:849b55ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849b5580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b5580 r8:8027ed34 r7:eab39e60 r6:847df400 r5:8512bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab59fb0 to 0xeab59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:4132 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:178 state:D stack:0 pid:4132 tgid:4132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab61d84 r8:00000002 r7:60000113 r6:eab61d8c r5:8512c800 r4:8512c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8512c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d0440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8512c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d3000 r10:61c88647 r9:8512c800 r8:849b562c r7:82804d40 r6:dddced40 r5:dddced60 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847da580 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:179 state:D stack:0 pid:4134 tgid:4134 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8512d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d0500 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8512d400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8507ef8c r4:8507ec00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8507ef8c r4:849b5680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8512d400 r8:849b56ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849b5680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b5680 r8:8027ed34 r7:eab39e60 r6:847df500 r5:8512d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab69fb0 to 0xeab69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0721d20 to 0xe0721d68) r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:00000000 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:180:4136 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8512e000 r5:8512e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:8512e000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8512e000 r8:849b572c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d0580 INFO: task kworker/0:180:4136 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bfb69000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:181:4139 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:181 state:D stack:0 pid:4139 tgid:4139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eab75d84 r8:00000002 r7:60000113 r6:eab75d8c r5:850b6000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:850b6000 r8:849b57ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0721d20 to 0xe0721d68) r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:332:4140 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:332 state:D stack:0 pid:4140 tgid:4140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab79d84 r8:00000002 r7:60000113 r6:eab79d8c r5:850b3c00 r4:850b3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:850b3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ec3c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:850b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e075b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cd38c r4:847df680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850b3c00 r8:847df6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847df680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847df680 r8:8027ed34 r7:eaaf9e60 r6:847df700 r5:850b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab79fb0 to 0xeab79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ec0c0 INFO: task kworker/1:332:4140 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r5:8512ec00 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) INFO: task kworker/1:333:4143 is blocked on a mutex likely owned by task kworker/1:226:3826. r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 r4:85130000 r5:85130000 r4:829187f0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Call trace: Exception stack(0xe0721d20 to 0xe0721d68) 1d20: c0218000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 1fa0: 00000000 00000000 00000000 00000000 r5:85130c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849b5800 r8:8027ed34 r7:eab75e60 r6:847df980 r5:85130c00 INFO: task kworker/0:182:4145 is blocked on a mutex likely owned by task kworker/1:226:3826. r4:82ac11e4 r4:e0721dc0 r5:00001000 r4:ee903000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eab7dd84 r8:00000002 r7:60000113 r6:eab7dd8c r5:85131800 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:e0721dc0 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 task:kworker/1:336 state:D stack:0 pid:4151 tgid:4151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab89d84 r8:00000002 r7:60000113 r6:eab89d8c r5:85132400 r4:85132400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85132400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84759580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85132400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe89000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cfb8c r4:850cf800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cfb8c r4:847dfb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85132400 r8:847dfb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847dfb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847dfb00 r8:8027ed34 r7:eab7de60 r6:847dfb80 r5:85132400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab89fb0 to 0xeab89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ec840 INFO: task kworker/1:336:4151 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85133000 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b6ec0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 Workqueue: events bpf_prog_free_deferred r5:85133c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d0ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85133c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab9f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516838c r4:85168000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516838c r4:849b5880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85133c00 r8:849b58ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849b5880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b5880 r8:8027ed34 r7:eab81e60 r6:847dfd00 r5:85133c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba5fb0 to 0xeaba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d0c80 INFO: task kworker/0:183:4155 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: c0be0000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:184:4157 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:184 state:D stack:0 pid:4157 tgid:4157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabb1d84 r8:00000002 r7:60000013 r6:eabb1d8c r5:85134800 r4:85134800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85134800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d0780 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85134800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85168b8c r4:85168800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85168b8c r4:849b5900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85134800 r8:849b592c r7:82804d40 r6:dddced40 r5:dddced60 r4:849b5900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b5900 r8:8027ed34 r7:eaba5e60 r6:847dfd80 r5:85134800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb1fb0 to 0xeabb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d0c80 INFO: task kworker/0:184:4157 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: c168d000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:185:4158 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:185 state:D stack:0 pid:4158 tgid:4158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eabb5d84 r8:00000002 r7:60000013 r6:eabb5d8c r5:85136000 r4:85136000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85136000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d0a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85136000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516878c r4:85168400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516878c r4:849b5980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85136000 r8:849b59ac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:185:4158 is blocked on a mutex likely owned by task kworker/1:226:3826. r4:00000000 r5:8602278c r4:86022400 r4:847da580 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85135400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85135400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516938c r4:85169000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516938c r4:849b5a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85135400 r8:849b5a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:849b5a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b5a00 r8:8027ed34 r7:eabb1e60 r6:847dfe80 r5:85135400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabcdfb0 to 0xeabcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d0ac0 INFO: task kworker/0:186:4160 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee903000 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:187 state:D stack:0 pid:4163 tgid:4163 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85136c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r5:85138c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bb300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85138c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516978c r4:85169400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516978c r4:849b5b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85138c00 r8:849b5b2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:4168 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:4168 tgid:4168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829187f4 r9:ea9e5d84 r8:00000002 r7:60000013 r6:ea9e5d8c r5:85138000 r5:85138000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:847da580 task:kworker/0:190 state:D stack:0 pid:4169 tgid:4169 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:8513a400 r8:849b5c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:e0721dc0 r4:847da580 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:191:4171 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:191 state:D stack:0 pid:4171 tgid:4171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa05d84 r8:00000002 r7:60000113 r6:eaa05d8c r5:8513bc00 r4:8513bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8513bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bb800 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8513bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd39000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516a78c r4:8516a400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516a78c r4:849b5c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513bc00 r8:849b5cac r7:82804d40 r6:dddced40 r5:dddced60 r4:849b5c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b5c80 r8:8027ed34 r7:ea9e5e60 r6:845db100 r5:8513bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d60: 80070013 ffffffff r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8513b000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:849b5d00 r4:847bb440 r5:80070013 r4:80239bd0 r5:8602278c r4:86022400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8513e000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bb900 r7:dddced40 r6:83018000 r5:8516ab8c r4:849b5d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b5d80 r8:8027ed34 r7:eaa05e60 r6:845db200 r5:8513e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa35fb0 to 0xeaa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bb4c0 INFO: task kworker/0:193:4176 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: c48e4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eaa55d84 r8:00000002 r7:60000113 r6:eaa55d8c r5:8513d400 r5:8513d400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8513d400 r8:849b5e2c r7:82804d40 r6:dddced40 r5:dddced60 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) task:kworker/0:195 state:D stack:0 pid:4180 tgid:4180 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847bbc40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85139800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00df000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516b38c r4:8516b000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516b38c r4:849b5e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85139800 r8:849b5eac r7:82804d40 r6:dddced40 r5:dddced60 r4:849b5e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849b5e80 r8:8027ed34 r7:eaa55e60 r6:845db300 r5:85139800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa65fb0 to 0xeaa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847bb700 INFO: task kworker/0:195:4180 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: c52a6000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:8513ec00 r4:829187f0 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8513ec00 r8:849b5f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:197:4183 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:197 state:D stack:0 pid:4183 tgid:4183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa9dd84 r8:00000002 r7:60000113 r6:eaa9dd8c r5:85140000 r5:85140000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:8516b78c r4:8516b400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:197:4183 is blocked on a mutex likely owned by task kworker/1:226:3826. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85142400 r4:829187f0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: c6a9b000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85143000 r4:829187f0 r4:00000000 r4:00000000 r5:8516c38c r4:8516c000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847bbe00 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:847da580 Workqueue: events bpf_prog_free_deferred r5:85143c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:847bbe00 r4:00000000 r5:80070013 r4:80239bd0 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:201:4191 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:201 state:D stack:0 pid:4191 tgid:4191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa2dd84 r8:00000002 r7:60000013 r6:eaa2dd8c r5:8450a400 r4:8450a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8450a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e80c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8450a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8889000 r5:8516c78c r4:8516c400 INFO: task kworker/0:201:4191 is blocked on a mutex likely owned by task kworker/1:226:3826. [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:202:4194 blocked for more than 455 seconds. r5:8450b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 r4:00000000 r5:8602278c r4:86022400 r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:203 state:D stack:0 pid:4196 tgid:4196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab0dd84 r8:00000002 r7:60000013 r6:eab0dd8c r5:8450bc00 r4:8450bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8450bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519e600 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8450bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516d78c r4:8516d400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516d78c r4:849a4380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8450bc00 r8:849a43ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849a4380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a4380 r8:8027ed34 r7:eab01e60 r6:849a4400 r5:8450bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab0dfb0 to 0xeab0dff8) INFO: task kworker/0:203:4196 is blocked on a mutex likely owned by task kworker/1:226:3826. [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:204:4198 blocked for more than 455 seconds. task:kworker/0:204 state:D stack:0 pid:4198 tgid:4198 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8450c800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) INFO: task kworker/0:205:4200 blocked for more than 455 seconds. [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516db8c r4:849a4580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85144800 r8:849a45ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849a4580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a4580 r8:8027ed34 r7:eab0de60 r6:845db600 r5:85144800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe9fb0 to 0xeabe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519e480 INFO: task kworker/0:205:4200 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: c86fc000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85145400 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8450d400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:849a4680 r8:8027ed34 r7:eabf1e60 r6:849a4700 r5:8450d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe1fb0 to 0xeabe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519e800 INFO: task kworker/0:207:4203 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: c8cfb000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:847da580 task:kworker/0:208 state:D stack:0 pid:4206 tgid:4206 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519eb40 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:00001000 r4:ee903000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:8519e9c0 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:210:4209 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:210 state:D stack:0 pid:4209 tgid:4209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab91d84 r8:00000002 r7:60000113 r6:eab91d8c r5:84509800 r4:84509800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84509800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8519eec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84509800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8516ef8c r4:8516ec00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8516ef8c r4:849a4980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84509800 r8:849a49ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849a4980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a4980 r8:8027ed34 r7:eabf5e60 r6:849a4a00 r5:84509800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab91fb0 to 0xeab91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519e9c0 INFO: task kworker/0:210:4209 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84508000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabfde08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:8516f78c r4:849a4a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84508000 r8:849a4aac r7:82804d40 r6:dddced40 r5:dddced60 r4:849a4a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a4a80 r8:8027ed34 r7:eab91e60 r6:849a4b00 r5:84508000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabfdfb0 to 0xeabfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8519ecc0 INFO: task kworker/0:211:4213 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: c9ffe000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r4:e0721dc0 r4:847da580 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:212:4214 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:212 state:D stack:0 pid:4214 tgid:4214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac09d84 r8:00000002 r7:60000113 r6:eac09d8c r5:84508c00 r4:84508c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84508c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847cce40 Workqueue: events bpf_prog_free_deferred r5:84936000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84936000 r8:849a4cac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:214:4218 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:214 state:D stack:0 pid:4218 tgid:4218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac2dd84 r8:00000002 r7:60000013 r6:eac2dd8c r5:85146000 r4:85146000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85146000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85146000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85146000 r8:849a4dac r7:82804d40 r6:dddced40 r5:dddced60 r4:e0721dc0 r5:00001000 r4:ee903000 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:215:4219 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred r4:85141800 r5:85141800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac39e08 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85141800 r8:849a4e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:849a4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849a4e00 r8:8027ed34 r7:eac01e60 r6:845db780 r5:85141800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac39fb0 to 0xeac39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bb240 INFO: task kworker/0:215:4219 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: cb54f000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:216:4222 blocked for more than 456 seconds. r5:85146c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac45e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:217 state:D stack:0 pid:4225 tgid:4225 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85148000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xeac61fb0 to 0xeac61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bb4c0 INFO: task kworker/0:217:4225 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: cb980000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:4226 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:4226 tgid:4226 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:eac6dd84 r8:00000002 r7:60000113 r6:eac6dd8c r5:85148c00 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8517578c r4:85175400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:4227 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac21d84 r8:00000002 r7:60000113 r6:eac21d8c r5:84848000 r4:84848000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84848000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb8c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84848000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac63000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85174f8c r4:85174c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85174f8c r4:851be000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84848000 r8:851be02c r7:82804d40 r6:dddced40 r5:dddced60 r4:851be000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be000 r8:8027ed34 r7:eac6de60 r6:851be080 r5:84848000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac21fb0 to 0xeac21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:220 state:D stack:0 pid:4230 tgid:4230 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84849800 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:00000000 r9:851be100 r8:8027ed34 r7:eac6de60 r6:851be180 r5:84849800 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:8484a400 r4:829187f0 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85175b8c r4:85175800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85175b8c r4:851be200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484a400 r8:851be22c r7:82804d40 r6:dddced40 r5:dddced60 r4:851be200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be200 r8:8027ed34 r7:eac6de60 r6:851be280 r5:8484a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bba00 INFO: task kworker/0:221:4233 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: cc8d6000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8484b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:223 state:D stack:0 pid:4236 tgid:4236 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8484bc00 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8517678c r4:85176400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0721d20 to 0xe0721d68) r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:224:4238 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:224 state:D stack:0 pid:4238 tgid:4238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac15d84 r8:00000002 r7:60000113 r6:eac15d8c r5:8484d400 r4:8484d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8484d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bbfc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8484d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517638c r4:85176000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:224:4238 is blocked on a mutex likely owned by task kworker/1:226:3826. [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:8484e000 r4:829187f0 r4:00000000 r4:00000001 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:4242 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:338 state:D stack:0 pid:4242 tgid:4242 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaccdd84 r8:00000002 r7:60000113 r6:eaccdd8c r5:84848c00 r4:84848c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84848c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r5:84936c00 r4:829187f0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 INFO: task kworker/0:227:4246 blocked for more than 456 seconds. r4:84a58000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a58000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ccd00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a58000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead07000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85177b8c r4:85177800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85177b8c r4:851be880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a58000 r8:851be8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851be880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be880 r8:8027ed34 r7:eacade60 r6:851be900 r5:84a58000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc1fb0 to 0xeacc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851cc400 INFO: task kworker/0:227:4246 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: ce1ac000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e0721dc0 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847cce40 Workqueue: events bpf_prog_free_deferred r5:84a58c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cc900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a58c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacef000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8517738c r4:85177000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8517738c r4:851be980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a58c00 r8:851be9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851be980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be980 r8:8027ed34 r7:eacc1e60 r6:851bea00 r5:84a58c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace1fb0 to 0xeace1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851cc400 INFO: task kworker/0:228:4247 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: ce5cc000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 Exception stack(0xe0721fb0 to 0xe0721ff8) r5:84a5a400 r4:829187f0 r4:00000000 r5:850cf78c r4:850cf400 r4:851b6e80 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r5:84a59800 r4:829187f0 r4:00000000 r5:8517778c r4:85177400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0721dc0 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:84a5b000 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c2140 r4:851bec00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bec00 r8:8027ed34 r7:eacc1e60 r6:851bec80 r5:84a5b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacedfb0 to 0xeacedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ccb40 INFO: task kworker/0:230:4253 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: ceba3000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e0721dc0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0721fb0 to 0xe0721ff8) r4:847cce40 INFO: task kworker/0:231:4254 blocked for more than 456 seconds. Workqueue: events bpf_prog_free_deferred r4:84a5d400 r5:84a5d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cc540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a5d400 r7:00000000 r6:83018000 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa9b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85177f8c r4:85177c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85177f8c r4:851bed00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5d400 r8:851bed2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851bed00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bed00 r8:8027ed34 r7:eacede60 r6:851bed80 r5:84a5d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead15fb0 to 0xead15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ccb00 INFO: task kworker/0:231:4254 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: cf237000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:340:4259 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:340 state:D stack:0 pid:4259 tgid:4259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eacddd84 r8:00000002 r7:60000113 r6:eacddd8c r5:8514bc00 r4:8514bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f1040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadbd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85186b8c r4:85186800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85186b8c r4:845dba80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514bc00 r8:845dbaac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845dba80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845dba80 r8:8027ed34 r7:eab89e60 r6:845dbb00 r5:8514bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacddfb0 to 0xeacddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851b6640 INFO: task kworker/1:340:4259 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: cf2e9000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:4261 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:4261 tgid:4261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab99d84 r8:00000002 r7:60000013 r6:eab99d8c r5:85149800 r4:85149800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85149800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab99e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c2040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85149800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb35000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518038c r4:85180000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518038c r4:851bee00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85149800 r8:851bee2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851bee00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bee00 r8:8027ed34 r7:eacede60 r6:845dbb80 r5:85149800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab99fb0 to 0xeab99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c2140 INFO: task kworker/0:232:4261 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: cf2e9000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:4262 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:4262 tgid:4262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eab9dd84 r8:00000002 r7:60000013 r6:eab9dd8c r5:8514c800 r4:8514c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c2600 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8514c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffbf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85180f8c r4:85180c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85180f8c r4:851bee80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514c800 r8:851beeac r7:82804d40 r6:dddced40 r5:dddced60 r4:851bee80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bee80 r8:8027ed34 r7:eacede60 r6:845dbc00 r5:8514c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab9dfb0 to 0xeab9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:851c22c0 Call trace: 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8514e000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 r9:83018005 r8:8514e000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r10:61c88647 r9:8514e000 r8:851bef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c2000 Call trace: r5:80070013 r4:80239bd0 r4:00000000 r5:8602278c r4:86022400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8514b000 r5:8514b000 r4:829187f0 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ef140 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8514b000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabab000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cff8c r4:850cfc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cff8c r4:845dbd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514b000 r8:845dbd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845dbd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845dbd00 r8:8027ed34 r7:eacdde60 r6:845dbd80 r5:8514b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc9fb0 to 0xeabc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851bf0c0 INFO: task kworker/1:341:4267 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: cfdb7000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8513c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c2880 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8513c800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0424000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518178c r4:85181400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518178c r4:851bef80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8513c800 r8:851befac r7:82804d40 r6:dddced40 r5:dddced60 r4:851bef80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bef80 r8:8027ed34 r7:eab9de60 r6:845dbe00 r5:8513c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead21fb0 to 0xead21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c2480 INFO: task kworker/0:235:4269 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d03e3000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:236:4270 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:236 state:D stack:0 pid:4270 tgid:4270 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8514d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:8518138c r4:851c7000 r4:851c7000 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r4:851c2480 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:847da580 1fa0: 00000000 00000000 00000000 00000000 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:4272 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:4272 tgid:4272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead2dd84 r8:00000002 r7:60000113 r6:ead2dd8c r5:8514ec00 r4:8514ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8514ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84759500 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8514ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e075d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518378c r4:85183400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518378c r4:851c7080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8514ec00 r8:851c70ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7080 r8:8027ed34 r7:ead21e60 r6:845dbf00 r5:8514ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead2dfb0 to 0xead2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c25c0 INFO: task kworker/0:237:4272 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d08d8000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847da580 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:238:4274 blocked for more than 456 seconds. Workqueue: events bpf_prog_free_deferred r4:85150c00 r5:85150c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c29c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85150c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0467000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85181b8c r4:85181800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85181b8c r4:851c7100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85150c00 r8:851c712c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7100 r8:8027ed34 r7:ead2de60 r6:845dbf80 r5:85150c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead35fb0 to 0xead35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c2700 INFO: task kworker/0:238:4274 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d115e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:239:4276 blocked for more than 456 seconds. r5:85152400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead3de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:240:4278 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:4278 tgid:4278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead45d84 r8:00000002 r7:60000113 r6:ead45d8c r5:85151800 r4:85151800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85151800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c2c40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85151800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0637000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518238c r4:85182000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518238c r4:851c7200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85151800 r8:851c722c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7200 r8:8027ed34 r7:ead2de60 r6:851d7080 r5:85151800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead45fb0 to 0xead45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c2980 INFO: task kworker/0:240:4278 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d115e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:4280 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:4280 tgid:4280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead4dd84 r8:00000002 r7:60000013 r6:ead4dd8c r5:85153000 r4:85153000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85153000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c2d80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85153000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06cf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518278c r4:85182400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518278c r4:851c7280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85153000 r8:851c72ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7280 r8:8027ed34 r7:ead2de60 r6:851d7100 r5:85153000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead4dfb0 to 0xead4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c2ac0 INFO: task kworker/0:241:4280 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d115e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:4283 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:4283 tgid:4283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead59d84 r8:00000002 r7:60000113 r6:ead59d8c r5:85150000 r4:85150000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85150000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c2ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85150000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ef000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85182b8c r4:85182800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85182b8c r4:851c7300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85150000 r8:851c732c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7300 r8:8027ed34 r7:ead2de60 r6:851d7180 r5:85150000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead59fb0 to 0xead59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c2e00 INFO: task kworker/0:242:4283 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80070013 ffffffff r4:e0721dc0 r5:00001000 r4:ee903000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85153c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:85153c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r7:dddced40 r6:83018000 r5:85182f8c r4:851c7380 r4:851c7380 r4:00000001 Exception stack(0xead5dfb0 to 0xead5dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0721d20 to 0xe0721d68) r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r5:00001000 r4:ee903000 r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:244:4287 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:244 state:D stack:0 pid:4287 tgid:4287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaca1d84 r8:00000002 r7:60000113 r6:eaca1d8c r5:84a5c800 r4:84a5c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a5c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ccd80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a5c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e072b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518338c r4:85183000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518338c r4:851c7400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5c800 r8:851c742c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7400 r8:8027ed34 r7:ead2de60 r6:851c7480 r5:84a5c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca1fb0 to 0xeaca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ccfc0 INFO: task kworker/0:244:4287 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d1ead000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:245:4289 blocked for more than 456 seconds. r5:84a5ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead61e08 r5:00001000 r4:ea955000 r7:dddced40 r6:83018000 r5:8518478c r4:851c7500 r4:851c7500 r4:00000001 Exception stack(0xead61fb0 to 0xead61ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:00000000 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85156000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e01c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85156000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07fb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85183b8c r4:85183800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85183b8c r4:851c7600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85156000 r8:851c762c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7600 r8:8027ed34 r7:ead61e60 r6:851d7280 r5:85156000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead6dfb0 to 0xead6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851c2c00 INFO: task kworker/0:246:4290 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d263f000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/0:247:4292 blocked for more than 456 seconds. r5:85155400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d60: 80070013 ffffffff r4:e0721dc0 r5:00001000 r4:ee903000 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:4295 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:4295 tgid:4295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead81d84 r8:00000002 r7:60000013 r6:ead81d8c r5:85154800 r4:85154800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85154800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85154800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea935000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518438c r4:85184000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518438c r4:851c7700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85154800 r8:851c772c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7700 r8:8027ed34 r7:ead61e60 r6:851d7380 r5:85154800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead81fb0 to 0xead81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e0180 INFO: task kworker/0:248:4295 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d263f000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:85156c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead85e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:847da580 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:250:4298 blocked for more than 456 seconds. task:kworker/0:250 state:D stack:0 pid:4298 tgid:4298 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8514a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:8514a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8514a400 r8:851c782c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d348a000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:4301 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:4301 tgid:4301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead8dd84 r8:00000002 r7:60000013 r6:ead8dd8c r5:85158000 r4:85158000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85158000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0980 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85158000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab4b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518538c r4:85185000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518538c r4:851c7880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85158000 r8:851c78ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7880 r8:8027ed34 r7:ead85e60 r6:851d7500 r5:85158000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead8dfb0 to 0xead8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e06c0 INFO: task kworker/0:251:4301 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d3975000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:4304 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:4304 tgid:4304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead95d84 r8:00000002 r7:60000113 r6:ead95d8c r5:85159800 r4:85159800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85159800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85159800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85159800 r8:851c792c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r4:851e06c0 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:e0721dc0 r4:00000000 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:4305 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:4305 tgid:4305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead99d84 r8:00000002 r7:60000013 r6:ead99d8c r5:8515a400 r4:8515a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8515a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead99e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0c40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8515a400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab6b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85185b8c r4:85185800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85185b8c r4:851c7980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515a400 r8:851c79ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7980 r8:8027ed34 r7:ead95e60 r6:851d7600 r5:8515a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead99fb0 to 0xead99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e0880 INFO: task kworker/0:253:4305 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 r5:80070013 r4:80239bd0 r5:00001000 r4:ee903000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8515b000 r4:829187f0 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0f00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8515b000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518638c r4:85186000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518638c r4:851c7a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515b000 r8:851c7a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7a00 r8:8027ed34 r7:ead99e60 r6:851d7680 r5:8515b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead91fb0 to 0xead91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e0ac0 INFO: task kworker/0:254:4308 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:255:4309 blocked for more than 456 seconds. [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eada1d84 r8:00000002 r7:60000013 r6:eada1d8c r5:8515bc00 r4:8515bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8515bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0e80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8515bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85185f8c r4:85185c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85185f8c r4:851c7a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515bc00 r8:851c7aac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7a80 r8:8027ed34 r7:ead91e60 r6:851d7700 r5:8515bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada1fb0 to 0xeada1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e0900 INFO: task kworker/0:255:4309 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d4486000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515e000 r5:8515e000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae11000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85187f8c r4:85187c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85187f8c r4:851c7b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515e000 r8:851c7b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7b00 r8:8027ed34 r7:ead91e60 r6:851d7780 r5:8515e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc1fb0 to 0xeadc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e0900 INFO: task kworker/0:256:4312 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d4486000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8602278c r4:86022400 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:257 state:D stack:0 pid:4313 tgid:4313 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8515ec00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0b40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8515ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518678c r4:85186400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518678c r4:851c7b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515ec00 r8:851c7bac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7b80 r8:8027ed34 r7:eadc1e60 r6:851d7800 r5:8515ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc5fb0 to 0xeadc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851e0900 INFO: task kworker/0:257:4313 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:258 state:D stack:0 pid:4315 tgid:4315 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8515c800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) Exception stack(0xeadd5fb0 to 0xeadd5ff8) r4:00000000 r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 Exception stack(0xe0721fb0 to 0xe0721ff8) INFO: task kworker/1:342:4317 blocked for more than 456 seconds. task:kworker/1:342 state:D stack:0 pid:4317 tgid:4317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadd9d84 r8:00000002 r7:60000113 r6:eadd9d8c r5:85220c00 r4:85220c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85220c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ef900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85220c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae35000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:83ea0f8c r4:83ea0c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:83ea0f8c r4:851d7900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85220c00 r8:851d792c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d7900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d7900 r8:8027ed34 r7:eacdde60 r6:851d7980 r5:85220c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd9fb0 to 0xeadd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ef580 INFO: task kworker/1:342:4317 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0721dc0 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 INFO: task kworker/0:259:4319 blocked for more than 456 seconds. task:kworker/0:259 state:D stack:0 pid:4319 tgid:4319 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85220000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f13c0 r5:8518738c r4:85187000 r10:61c88647 r9:85220000 r8:851c7cac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:851f1300 INFO: task kworker/0:259:4319 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d59e5000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:343:4320 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:343 state:D stack:0 pid:4320 tgid:4320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadf5d84 r8:00000002 r7:60000113 r6:eadf5d8c r5:85222400 r4:85222400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85222400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf5e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:844d378c r4:844d3400 r4:851d7a80 Exception stack(0xeadf5fb0 to 0xeadf5ff8) r4:851ef900 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r5:00001000 r4:ee903000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:4322 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:4322 tgid:4322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadfdd84 r8:00000002 r7:60000013 r6:eadfdd8c r5:85223c00 r4:85223c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85223c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadfde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f1580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85223c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaded000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518778c r4:85187400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518778c r4:851c7d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85223c00 r8:851c7d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7d00 r8:8027ed34 r7:eadc1e60 r6:851d7b80 r5:85223c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f11c0 INFO: task kworker/0:260:4322 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe0721d20 to 0xe0721d68) r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0721fb0 to 0xe0721ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:261:4324 blocked for more than 457 seconds. task:kworker/0:261 state:D stack:0 pid:4324 tgid:4324 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85140c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f1680 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:85187b8c r4:851c7d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85140c00 r8:851c7dac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7d80 r8:8027ed34 r7:eadc1e60 r6:851c7e00 r5:85140c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead79fb0 to 0xead79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f15c0 INFO: task kworker/0:261:4324 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d59e5000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) Not tainted 6.15.0-syzkaller #0 r5:84a5e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeae09fb0 to 0xeae09ff8) r4:851f15c0 Workqueue: events bpf_prog_free_deferred 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:e0721dc0 r5:8602278c r4:86022400 Exception stack(0xe0721fb0 to 0xe0721ff8) [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae25e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f1940 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8484ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae21000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518838c r4:85188000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518838c r4:851c7f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484ec00 r8:851c7fac r7:82804d40 r6:dddced40 r5:dddced60 r4:851c7f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7f80 r8:8027ed34 r7:eae09e60 r6:851fe000 r5:8484ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f1780 INFO: task kworker/0:263:4329 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d6610000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r5:00001000 r4:ee903000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:264:4332 blocked for more than 457 seconds. r5:84830000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f1e00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84830000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518878c r4:85188400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518878c r4:851fe080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830000 r8:851fe0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851fe080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fe080 r8:8027ed34 r7:eae09e60 r6:851fe100 r5:84830000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae49fb0 to 0xeae49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f1a80 INFO: task kworker/0:264:4332 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d6610000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 r5:8602278c r4:86022400 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 r4:847cce40 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:84830c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ef6c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84830c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa0d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521c38c r4:8521c000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8521c38c r4:851d7c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84830c00 r8:851d7c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d7c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d7c00 r8:8027ed34 r7:eadd9e60 r6:851fe180 r5:84830c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae4dfb0 to 0xeae4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851effc0 INFO: task kworker/1:344:4333 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d6610000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:4335 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:4335 tgid:4335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea9f5d84 r8:00000002 r7:60000113 r6:ea9f5d8c r5:84832400 r4:84832400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84832400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f7780 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84832400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd7d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518978c r4:85189400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518978c r4:851fe200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84832400 r8:851fe22c r7:82804d40 r6:dddced40 r5:dddced60 r4:851fe200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fe200 r8:8027ed34 r7:eae09e60 r6:851fe280 r5:84832400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f5fb0 to 0xea9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f1a00 INFO: task kworker/0:265:4335 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d6d71000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:266:4339 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:266 state:D stack:0 pid:4339 tgid:4339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa89d84 r8:00000002 r7:60000113 r6:eaa89d8c r5:84831800 r5:84831800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f7040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84831800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcab000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85188f8c r4:85188c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85188f8c r4:851fe300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84831800 r8:851fe32c r7:82804d40 r6:dddced40 r5:dddced60 r4:851fe300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fe300 r8:8027ed34 r7:ea9f5e60 r6:851fe380 r5:84831800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa89fb0 to 0xeaa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f7080 INFO: task kworker/0:266:4339 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d73c3000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e0721dc0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:345:4340 blocked for more than 457 seconds. Workqueue: events bpf_prog_free_deferred r4:84833c00 r5:84833c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85201a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84833c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519578c r4:85195400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8519578c r4:851d7c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84833c00 r8:851d7cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851d7c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d7c80 r8:8027ed34 r7:eae4de60 r6:851fe400 r5:84833c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa49fb0 to 0xeaa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851efd40 INFO: task kworker/1:345:4340 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d73c3000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:4341 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:4341 tgid:4341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:84835400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851efd40 INFO: task kworker/1:346:4341 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d73c3000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84834800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f7580 r5:00001000 r4:dfd15000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518938c r4:85189000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518938c r4:851fe500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84834800 r8:851fe52c r7:82804d40 r6:dddced40 r5:dddced60 r4:851fe500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fe500 r8:8027ed34 r7:ea9f5e60 r6:851fe580 r5:84834800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac05fb0 to 0xeac05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f7240 INFO: task kworker/0:267:4344 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d7c52000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:4346 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:4346 tgid:4346 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac11d84 r8:00000002 r7:60000013 r6:eac11d8c r5:84836c00 r4:84836c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84836c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:84836c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 r5:85189b8c r4:85189800 r10:61c88647 r9:84836c00 r8:851fe62c r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d20: d7c52000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:269:4348 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac1dd84 r8:00000002 r7:60000013 r6:eac1dd8c r5:84a5bc00 r4:84a5bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a5bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f7c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a5bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0481000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85189f8c r4:85189c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85189f8c r4:851fe700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a5bc00 r8:851fe72c r7:82804d40 r6:dddced40 r5:dddced60 r4:851fe700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fe700 r8:8027ed34 r7:eac11e60 r6:851fe780 r5:84a5bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac1dfb0 to 0xeac1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f7600 INFO: task kworker/0:269:4348 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d850b000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:270:4350 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:4350 tgid:4350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaabdd84 r8:00000002 r7:60000113 r6:eaabdd8c r5:84836000 r4:84836000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84836000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaabde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f7d40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84836000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e050b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518a38c r4:8518a000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518a38c r4:851fe800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84836000 r8:851fe82c r7:82804d40 r6:dddced40 r5:dddced60 r4:851fe800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fe800 r8:8027ed34 r7:eac1de60 r6:851fe880 r5:84836000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaabdfb0 to 0xeaabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f7a80 INFO: task kworker/0:270:4350 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0721fb0 to 0xe0721ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84a38c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac35e08 r4:00000000 r5:8518ab8c r4:8518a800 r4:851fe900 Exception stack(0xeac35fb0 to 0xeac35ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f7bc0 INFO: task kworker/0:271:4352 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d8b43000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:272:4354 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:272 state:D stack:0 pid:4354 tgid:4354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac41d84 r8:00000002 r7:60000013 r6:eac41d8c r5:84a3a400 r4:84a3a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:84a3a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 r10:00000000 r9:851fea00 r8:8027ed34 r7:eac35e60 r6:851fea80 r5:84a3a400 r4:851f7e80 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 Not tainted 6.15.0-syzkaller #0 r5:84a3b000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4400 r10:61c88647 r9:84a3b000 r8:851feb2c r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0721d20 to 0xe0721d68) r4:e0721dc0 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:274:4357 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:274 state:D stack:0 pid:4357 tgid:4357 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae15d84 r8:00000002 r7:60000113 r6:eae15d8c r5:85223000 r4:85223000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85223000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4100 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85223000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9a1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518af8c r4:8518ac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518af8c r4:851fec00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85223000 r8:851fec2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851fec00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fec00 r8:8027ed34 r7:eac4de60 r6:851d7d80 r5:85223000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae15fb0 to 0xeae15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f76c0 INFO: task kworker/0:274:4357 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d8fa3000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 Exception stack(0xe0721fb0 to 0xe0721ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85226000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85226000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9bf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518b38c r4:8518b000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518b38c r4:851fec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85226000 r8:851fecac r7:82804d40 r6:dddced40 r5:dddced60 r4:851fec80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fec80 r8:8027ed34 r7:eac4de60 r6:851d7e00 r5:85226000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac51fb0 to 0xeac51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f41c0 INFO: task kworker/0:275:4359 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 1d20: d932e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 r4:00000001 INFO: task kworker/0:276:4362 blocked for more than 457 seconds. r5:85225400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: d9826000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:277:4364 blocked for more than 457 seconds. r5:85226c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85195f8c r4:85195c00 r10:00000000 r9:851fed80 r8:8027ed34 r7:eac69e60 r6:851d7f00 r5:85226c00 Workqueue: events bpf_prog_free_deferred r4:e0721dc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:278:4365 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:278 state:D stack:0 pid:4365 tgid:4365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac91d84 r8:00000002 r7:60000113 r6:eac91d8c r5:85221800 r4:85221800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85221800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f46c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85221800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa19000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8518bf8c r4:8518bc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8518bf8c r4:851fee00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85221800 r8:851fee2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851fee00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fee00 r8:8027ed34 r7:eac85e60 r6:851d7f80 r5:85221800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac91fb0 to 0xeac91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f4300 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 Not tainted 6.15.0-syzkaller #0 r5:85224800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f47c0 r10:61c88647 r9:85224800 r8:851feeac r7:82804d40 r6:dddced40 r5:dddced60 r4:851f4540 Call trace: 1d60: 80070013 ffffffff [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eacc9d84 r8:00000002 r7:60000113 r6:eacc9d8c r5:85158c00 r5:85158c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85158c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa71000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519478c r4:85194400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8519478c r4:851fef00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85158c00 r8:851fef2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851fef00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851fef00 r8:8027ed34 r7:eac85e60 r6:85207080 r5:85158c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc9fb0 to 0xeacc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f45c0 INFO: task kworker/0:280:4369 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: d9fcd000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:281 state:D stack:0 pid:4371 tgid:4371 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85228c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:85228c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 r10:61c88647 r9:85228c00 r8:851fefac r7:82804d40 r6:dddced40 r5:dddced60 r4:851f4780 r4:00000000 r4:e0721dc0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85228000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85228000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85194f8c r4:85194c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85194f8c r4:85206000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85228000 r8:8520602c r7:82804d40 r6:dddced40 r5:dddced60 r4:85206000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85206000 r8:8027ed34 r7:eac85e60 r6:85207180 r5:85228000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead0dfb0 to 0xead0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f48c0 INFO: task kworker/0:282:4373 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 1d20: da65b000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84a3bc00 r5:84a3bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f48c0 INFO: task kworker/0:283:4375 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: da65b000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:4378 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:4378 tgid:4378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ead1dd84 r8:00000002 r7:60000113 r6:ead1dd8c r5:84a3c800 r4:84a3c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ef240 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85195b8c r4:85206180 r10:00000000 r9:85206180 r8:8027ed34 r7:eac85e60 r6:85206200 r5:84a3c800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0721fb0 to 0xe0721ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84a3e000 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852950c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a3e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521df8c r4:8521dc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8521df8c r4:85207200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3e000 r8:8520722c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85207200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85207200 r8:8027ed34 r7:eaa49e60 r6:85207280 r5:84a3e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae5dfb0 to 0xeae5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85201940 INFO: task kworker/1:347:4379 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: da97c000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:348:4380 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:348 state:D stack:0 pid:4380 tgid:4380 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eac29d84 r8:00000002 r7:60000113 r6:eac29d8c r5:8522a400 r4:8522a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85201d40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8522a400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac31000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521cb8c r4:8521c800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8521cb8c r4:85207300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522a400 r8:8520732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85207300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85207300 r8:8027ed34 r7:eae5de60 r6:85207380 r5:8522a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac29fb0 to 0xeac29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85201940 INFO: task kworker/1:348:4380 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: dad08000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:82ac11e4 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8522b000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae59e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85201ec0 r7:ddde2d40 r6:83018200 r5:8521cf8c r4:85207400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522b000 r8:8520742c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85207400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85207400 r8:8027ed34 r7:eae5de60 r6:85207480 r5:8522b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae59fb0 to 0xeae59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85201bc0 INFO: task kworker/1:349:4382 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: dad08000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:350 state:D stack:0 pid:4385 tgid:4385 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8522bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae61e08 r5:00001000 r4:eabd3000 r5:8521d78c r4:8521d400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8521d78c r4:85207500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522bc00 r8:8520752c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85207500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85207500 r8:8027ed34 r7:eae5de60 r6:85207580 r5:8522bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae61fb0 to 0xeae61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85201cc0 INFO: task kworker/1:350:4385 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: db04d000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000001 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fb2c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8522c800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519678c r4:85196400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8519678c r4:85206280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522c800 r8:852062ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85206280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8522d400 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519638c r4:85196000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8519638c r4:85206300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522d400 r8:8520632c r7:82804d40 r6:dddced40 r5:dddced60 r4:85206300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85206300 r8:8027ed34 r7:ead51e60 r6:85207680 r5:8522d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadadfb0 to 0xeadadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fb200 INFO: task kworker/0:286:4391 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: db44e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:287:4392 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:287 state:D stack:0 pid:4392 tgid:4392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eadb5d84 r8:00000002 r7:60000113 r6:eadb5d8c r5:85229800 r5:85229800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb5e08 r9:83018005 r8:85229800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 r10:61c88647 r9:85229800 r8:852063ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851fb200 Call trace: 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadcde08 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85196b8c r4:85206400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8515d400 r8:8520642c r7:82804d40 r6:dddced40 r5:dddced60 r4:85206400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85206400 r8:8027ed34 r7:eadb5e60 r6:85207780 r5:8515d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadcdfb0 to 0xeadcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fb380 INFO: task kworker/0:288:4394 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: dbfb8000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 Exception stack(0xe0721fb0 to 0xe0721ff8) Not tainted 6.15.0-syzkaller #0 r5:84a70c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae55e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85206480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:e0721dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0721fb0 to 0xe0721ff8) r5:84a71800 r4:829187f0 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fb700 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a71800 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfffb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8519738c r4:85197000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8519738c r4:85206500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a71800 r8:8520652c r7:82804d40 r6:dddced40 r5:dddced60 r4:85206500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85206500 r8:8027ed34 r7:eadb5e60 r6:85207880 r5:84a71800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae69fb0 to 0xeae69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fb3c0 INFO: task kworker/0:290:4397 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: dc77a000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0721fb0 to 0xe0721ff8) INFO: task kworker/0:291:4399 blocked for more than 457 seconds. r5:84a73000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fb840 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:e0721dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a70000 r4:829187f0 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85197b8c r4:85206600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a70000 r8:8520662c r7:82804d40 r6:dddced40 r5:dddced60 r4:85206600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85206600 r8:8027ed34 r7:eadb5e60 r6:85207980 r5:84a70000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae79fb0 to 0xeae79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fb6c0 INFO: task kworker/0:292:4401 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: dce13000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:293:4404 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:293 state:D stack:0 pid:4404 tgid:4404 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a73c00 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae85fb0 to 0xeae85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fb6c0 INFO: task kworker/0:293:4404 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: dd29d000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r5:80070013 r4:80239bd0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84a74800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fbe80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a74800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0727000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d0b8c r4:852d0800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d0b8c r4:85206700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:00000000 r4:e0721dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 INFO: task kworker/0:295:4408 blocked for more than 457 seconds. r4:84a76000 r5:84a76000 r4:829187f0 r4:00000000 r4:00000000 r7:dddced40 r6:83018000 r5:852d078c r4:85206780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a76000 r8:852067ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85206780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85206780 r8:8027ed34 r7:eae91e60 r6:85207b00 r5:84a76000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae95fb0 to 0xeae95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fb9c0 INFO: task kworker/0:295:4408 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0721d20 to 0xe0721d68) r4:e0721dc0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84a72400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fbc80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a72400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e074f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d0f8c r4:852d0c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d0f8c r4:85206800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a72400 r8:8520682c r7:82804d40 r6:dddced40 r5:dddced60 r4:85206800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85206800 r8:8027ed34 r7:eae91e60 r6:85207b80 r5:84a72400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae9dfb0 to 0xeae9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fbc80 INFO: task kworker/0:296:4410 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: dd928000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:297:4412 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:297 state:D stack:0 pid:4412 tgid:4412 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaea5d84 r8:00000002 r7:60000013 r6:eaea5d8c r5:8522e000 r4:8522e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852990c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8522e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea949000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d1b8c r4:852d1800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d1b8c r4:85206880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522e000 r8:852068ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85206880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85206880 r8:8027ed34 r7:eae9de60 r6:85207c00 r5:8522e000 5fa0: 00000000 00000000 00000000 00000000 r4:851fbe40 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 1d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:298:4413 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:298 state:D stack:0 pid:4413 tgid:4413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaea9d84 r8:00000002 r7:60000113 r6:eaea9d8c r5:8522ec00 r4:8522ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8522ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85201480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8522ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07fd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d138c r4:852d1000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d138c r4:85206900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8522ec00 r8:8520692c r7:82804d40 r6:dddced40 r5:dddced60 r4:85206900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85206900 r8:8027ed34 r7:eaea5e60 r6:85207c80 r5:8522ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea9fb0 to 0xeaea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851fbe40 INFO: task kworker/0:298:4413 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 1d20: dde26000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8602278c r4:86022400 r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:4415 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:4415 tgid:4415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaeb1d84 r8:00000002 r7:60000013 r6:eaeb1d8c r5:85230000 r4:85230000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85230000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847595c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85230000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88df000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d178c r4:852d1400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d178c r4:85206980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85230000 r8:852069ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85206980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85206980 r8:8027ed34 r7:eaea5e60 r6:85207d00 r5:85230000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb1fb0 to 0xeaeb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:e0721dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 r4:847da580 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85231800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85299680 r7:dddced40 r6:83018000 r5:852d278c r4:85206a00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:301:4419 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:301 state:D stack:0 pid:4419 tgid:4419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85232400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:85232400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 r4:85206a80 dfa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 r4:e0721dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85233000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeade08 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85233000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab55000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d238c r4:852d2000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d238c r4:85206b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85233000 r8:85206b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85206b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85206b00 r8:8027ed34 r7:eaeb9e60 r6:85207e80 r5:85233000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeadfb0 to 0xeaeadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85299300 INFO: task kworker/0:302:4422 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: de958000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:303:4424 blocked for more than 458 seconds. Call trace: r5:85233c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852998c0 r5:00001000 r4:eadb9000 r7:dddced40 r6:83018000 r5:852d478c r4:85206b80 Exception stack(0xeaec1fb0 to 0xeaec1ff8) r4:85299480 Workqueue: events bpf_prog_free_deferred 1d20: dea97000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:304 state:D stack:0 pid:4427 tgid:4427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaec5d84 r8:00000002 r7:60000013 r6:eaec5d8c r5:85234800 r4:85234800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85234800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85299740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85234800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d2b8c r4:852d2800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d2b8c r4:85206c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85234800 r8:85206c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85206c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85206c00 r8:8027ed34 r7:eaec1e60 r6:85207f80 r5:85234800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec5fb0 to 0xeaec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85299480 INFO: task kworker/0:304:4427 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: defd4000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 r4:847da580 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eaec9d84 r8:00000002 r7:60000013 r6:eaec9d8c r5:85235400 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d2f8c r4:852d2c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d2f8c r4:85206c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85235400 r8:85206cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85206c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85206c80 r8:8027ed34 r7:eaec1e60 r6:8529e000 r5:85235400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85299480 INFO: task kworker/0:305:4428 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: df200000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0721dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 Not tainted 6.15.0-syzkaller #0 r4:85236000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae65e08 r4:00000000 r5:00001000 r4:ead01000 r10:61c88647 r9:85236000 r8:8529e0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:4434 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:4434 tgid:4434 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ea959d84 r8:00000002 r7:60000113 r6:ea959d8c r5:85236c00 r4:85236c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85236c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea959e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8521f38c r4:8521f000 r10:00000000 r9:8529e180 r8:8027ed34 r7:eae5de60 r6:8529e200 r5:85236c00 r4:85295000 r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:e0721dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:4435 tgid:4435 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaecdd84 r8:00000002 r7:60000113 r6:eaecdd8c r5:85230c00 r4:85230c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85230c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaecde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:852d338c r4:85206d00 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:307 state:D stack:0 pid:4437 tgid:4437 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000001 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:308 state:D stack:0 pid:4440 tgid:4440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf0dd84 r8:00000002 r7:60000013 r6:eaf0dd8c r5:85238000 r4:85238000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85238000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85299dc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85238000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 r10:61c88647 r9:85238000 r8:85206e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000000 r4:e0771dc0 r5:8501338c r4:85013000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85239800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b64c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85239800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521e38c r4:8521e000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8521e38c r4:8529e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85239800 r8:8529e42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8529e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8529e400 r8:8027ed34 r7:ea959e60 r6:8529e480 r5:85239800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf11fb0 to 0xeaf11ff8) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:e0771dc0 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf15d84 r8:00000002 r7:60000113 r6:eaf15d8c r5:8523a400 r4:8523a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8523a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85299f00 r5:00001000 r4:ead71000 r10:61c88647 r9:8523a400 r8:85206eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85299ac0 INFO: task kworker/0:309:4442 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 7fe8c000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 90070013 ffffffff r5:90070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:4444 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:4444 tgid:4444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf49d84 r8:00000002 r7:60000113 r6:eaf49d8c r5:85238c00 r4:85238c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85238c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:8497f8c0 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:eaedb000 r10:00000000 r9:85206f80 r8:8027ed34 r7:eaec1e60 r6:8529e600 r5:8523c800 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:312:4448 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d4b8c r4:852d4800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d4b8c r4:852a0000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523bc00 r8:852a002c r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0000 r8:8027ed34 r7:eaf5de60 r6:8529e680 r5:8523bc00 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 80070013 ffffffff r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:313:4450 blocked for more than 458 seconds. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8523e000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadeb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d4f8c r4:852d4c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d4f8c r4:852a0080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523e000 r8:852a00ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0080 r8:8027ed34 r7:eaf5de60 r6:8529e700 r5:8523e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf6dfb0 to 0xeaf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529f2c0 INFO: task kworker/0:313:4450 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 807bf000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0771fb0 to 0xe0771ff8) r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:4452 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:4452 tgid:4452 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf79d84 r8:00000002 r7:60000113 r6:eaf79d8c r5:8523d400 r4:8523d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8523d400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r7:dddced40 r6:83018000 r5:852d538c r4:852a0100 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 80a78000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xe0771fb0 to 0xe0771ff8) r5:8523b000 r4:829187f0 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xeaf7dfb0 to 0xeaf7dff8) 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:8523ec00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:852d5b8c r4:852a0200 r10:00000000 r9:852a0200 r8:8027ed34 r7:eaf5de60 r6:8529e880 r5:8523ec00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0771d20 to 0xe0771d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r5:00001000 r4:dfa99000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:317:4458 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:317 state:D stack:0 pid:4458 tgid:4458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf89d84 r8:00000002 r7:60000113 r6:eaf89d8c r5:85240000 r4:85240000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85240000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529f800 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85240000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae31000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d5f8c r4:852d5c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d5f8c r4:852a0280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85240000 r8:852a02ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0280 r8:8027ed34 r7:eaf5de60 r6:8529e900 r5:85240000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf89fb0 to 0xeaf89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529f740 INFO: task kworker/0:317:4458 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 80dc7000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:4460 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:318 state:D stack:0 pid:4460 tgid:4460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf91d84 r8:00000002 r7:60000013 r6:eaf91d8c r5:85241800 r4:85241800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85241800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529f980 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85241800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d638c r4:852d6000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d638c r4:852a0300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85241800 r8:852a032c r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0300 r8:8027ed34 r7:eaf5de60 r6:8529e980 r5:85241800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf91fb0 to 0xeaf91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529f640 INFO: task kworker/0:318:4460 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 8145e000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:319:4463 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:319 state:D stack:0 pid:4463 tgid:4463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf9dd84 r8:00000002 r7:60000013 r6:eaf9dd8c r5:85240c00 r4:85240c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85240c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529fbc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85240c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf17000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d6b8c r4:852d6800 r7:dddced40 r6:83018000 r5:852d6b8c r4:852a0380 Exception stack(0xeaf9dfb0 to 0xeaf9dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 1d20: 8145e000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r4:847da880 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:320:4465 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:320 state:D stack:0 pid:4465 tgid:4465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafa5d84 r8:00000002 r7:60000013 r6:eafa5d8c r5:85243c00 r4:85243c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85243c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b6a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85243c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521eb8c r4:8521e800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8521eb8c r4:852a0480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85243c00 r8:852a04ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0480 r8:8027ed34 r7:eaf9de60 r6:8529ea80 r5:85243c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa5fb0 to 0xeafa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529fcc0 INFO: task kworker/0:320:4465 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 81673000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:321:4466 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:321 state:D stack:0 pid:4466 tgid:4466 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafa9d84 r8:00000002 r7:60000013 r6:eafa9d8c r5:85243000 r4:85243000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85243000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529fd00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85243000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf37000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d6f8c r4:852d6c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d6f8c r4:852a0500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85243000 r8:852a052c r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0500 r8:8027ed34 r7:eafa5e60 r6:8529eb00 r5:85243000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa9fb0 to 0xeafa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85242400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafbde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8529fe80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85242400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafaf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d738c r4:852d7000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d738c r4:852a0400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85242400 r8:852a042c r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0400 r8:8027ed34 r7:eafa5e60 r6:8529eb80 r5:85242400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafbdfb0 to 0xeafbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8529fa40 INFO: task kworker/0:322:4468 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 81b39000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:323:4470 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:eafcdd84 r8:00000002 r7:60000113 r6:eafcdd8c r5:85244800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafcde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:852d778c r4:852d7400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8529ff80 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 81e27000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:324:4472 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:324 state:D stack:0 pid:4472 tgid:4472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafddd84 r8:00000002 r7:60000013 r6:eafddd8c r5:85245400 r4:85245400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85245400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafdde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85295480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85245400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d7b8c r4:852d7800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d7b8c r4:852a0600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85245400 r8:852a062c r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0600 r8:8027ed34 r7:eafa5e60 r6:8529ec80 r5:85245400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafddfb0 to 0xeafddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85295400 INFO: task kworker/0:324:4472 is blocked on a mutex likely owned by task kworker/1:227:3838. Workqueue: events bpf_prog_free_deferred Exception stack(0xe0771d20 to 0xe0771d68) 1d60: 80070013 ffffffff r4:e0771dc0 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85246000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:00001000 r4:eafef000 r10:61c88647 r9:85246000 r8:852a06ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafedfb0 to 0xeafedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85295400 INFO: task kworker/0:325:4475 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 821a1000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:354:4477 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:354 state:D stack:0 pid:4477 tgid:4477 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb001d84 r8:00000002 r7:60000113 r6:eb001d8c r5:85248000 r4:85248000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85248000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da880 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:326:4478 blocked for more than 458 seconds. Workqueue: events bpf_prog_free_deferred r4:85248c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:852d838c r4:852d8000 r7:dddced40 r6:83018000 r5:852d838c r4:852a0700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85248c00 r8:852a072c r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0700 r8:8027ed34 r7:eafa5e60 r6:8529ee80 r5:85248c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b9040 INFO: task kworker/0:326:4478 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 82d13000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:4482 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:4482 tgid:4482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf75d84 r8:00000002 r7:60000113 r6:eaf75d8c r5:85249800 r4:85249800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85249800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85249800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d978c r4:852d9400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d978c r4:852a0780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85249800 r8:852a07ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0780 r8:8027ed34 r7:eafa5e60 r6:8529ef00 r5:85249800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf75fb0 to 0xeaf75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b9200 INFO: task kworker/0:327:4482 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 82d13000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:328:4483 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:4483 tgid:4483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaa29d84 r8:00000002 r7:60000113 r6:eaa29d8c r5:8524a400 r4:8524a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8524a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8524a400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d878c r4:852d8400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d878c r4:852a0800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524a400 r8:852a082c r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0800 r8:8027ed34 r7:eaf75e60 r6:8529ef80 r5:8524a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa29fb0 to 0xeaa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b9040 INFO: task kworker/0:328:4483 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8524b000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d8b8c r4:852d8800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d8b8c r4:852a0880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524b000 r8:852a08ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0880 r8:8027ed34 r7:eaf75e60 r6:852c1180 r5:8524b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca9fb0 to 0xeaca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b9380 INFO: task kworker/0:329:4486 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 83566000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb015e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:82ac11e4 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8501338c r4:85013000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:331 state:D stack:0 pid:4489 tgid:4489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb01dd84 r8:00000002 r7:60000113 r6:eb01dd8c r5:8524bc00 r4:8524bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8524bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b97c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8524bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdbf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d938c r4:852d9000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d938c r4:852a0980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524bc00 r8:852a09ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0980 r8:8027ed34 r7:eaf75e60 r6:852c1280 r5:8524bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb01dfb0 to 0xeb01dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b9540 INFO: task kworker/0:331:4489 is blocked on a mutex likely owned by task kworker/1:227:3838. Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8497f8c0 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:852da78c r4:852da400 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a76c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04f9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d9b8c r4:852d9800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852d9b8c r4:852a0a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a76c00 r8:852a0aac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0a80 r8:8027ed34 r7:eb029e60 r6:852c1380 r5:84a76c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb031fb0 to 0xeb031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b9780 INFO: task kworker/0:333:4494 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 83e92000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:e0771dc0 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85251800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8893000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852da38c r4:852da000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852da38c r4:852a0b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85251800 r8:852a0bac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0b80 r8:8027ed34 r7:eb029e60 r6:852c1480 r5:85251800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb03dfb0 to 0xeb03dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b9980 INFO: task kworker/0:335:4497 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 84e4e000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:336:4500 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:336 state:D stack:0 pid:4500 tgid:4500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:85252400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb049fb0 to 0xeb049ff8) Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8497f8c0 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:338:4504 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:338 state:D stack:0 pid:4504 tgid:4504 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb059d84 r8:00000002 r7:60000013 r6:eb059d8c r5:85254800 r4:85254800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85254800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb059e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b9180 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85254800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa0f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: 858ba000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:852db38c r4:852db000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:847da880 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:340:4508 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:340 state:D stack:0 pid:4508 tgid:4508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb051d84 r8:00000002 r7:60000013 r6:eb051d8c r5:84a3ec00 r4:84a3ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a3ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530c300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a3ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa85000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852db78c r4:852db400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852db78c r4:852a0e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3ec00 r8:852a0eac r7:82804d40 r6:dddced40 r5:dddced60 r4:852a0e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852a0e80 r8:8027ed34 r7:eb055e60 r6:852a0f00 r5:84a3ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb051fb0 to 0xeb051ff8) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:341 state:D stack:0 pid:4509 tgid:4509 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:852dbb8c r4:852db800 r10:00000000 r9:852a0f80 r8:8027ed34 r7:eb055e60 r6:8530f000 r5:84a39800 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eb065d84 r8:00000002 r7:60000113 r6:eb065d8c r5:84a3d400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabe3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dc38c r4:852dc000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852dc38c r4:8530f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a3d400 r8:8530f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8530f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8530f080 r8:8027ed34 r7:eb055e60 r6:8530f100 r5:84a3d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb065fb0 to 0xeb065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8530c6c0 INFO: task kworker/0:342:4512 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 86733000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:343:4513 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:343 state:D stack:0 pid:4513 tgid:4513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaefdd84 r8:00000002 r7:60000113 r6:eaefdd8c r5:85246c00 r4:85246c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaefdfb0 to 0xeaefdff8) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0771fb0 to 0xe0771ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:eb069d84 r8:00000002 r7:60000113 r6:eb069d8c r5:8484c800 r4:8484c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8484c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530c900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8484c800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac19000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dc78c r4:852dc400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852dc78c r4:8530f280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8484c800 r8:8530f2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8530f280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8530f280 r8:8027ed34 r7:eaefde60 r6:8530f300 r5:8484c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8530c680 INFO: task kworker/0:344:4516 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:852dcb8c r4:8530f380 r4:00000001 r4:8530c9c0 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:4520 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:4520 tgid:4520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb075d84 r8:00000002 r7:60000113 r6:eb075d8c r5:848d8000 r4:848d8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848d8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb075e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530cd80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dd38c r4:852dd000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852dd38c r4:8530f480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848d8000 r8:8530f4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8530f480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8530f480 r8:8027ed34 r7:eaefde60 r6:8530f500 r5:848d8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb075fb0 to 0xeb075ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8530ca00 INFO: task kworker/0:346:4520 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 875d5000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:e0771dc0 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:848d8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:848d8c00 r8:8530f5ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:348:4525 blocked for more than 459 seconds. task:kworker/0:348 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848d9800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 87a85000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:349 state:D stack:0 pid:4526 tgid:4526 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848da400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:349:4526 is blocked on a mutex likely owned by task kworker/1:227:3838. [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:350 state:D stack:0 pid:4528 tgid:4528 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8530f880 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:351:4531 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:351 state:D stack:0 pid:4531 tgid:4531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0a9d84 r8:00000002 r7:60000113 r6:eb0a9d8c r5:848dbc00 r4:848dbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848dbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852deb8c r4:852de800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852deb8c r4:8530f980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848dbc00 r8:8530f9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8530f980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb091d84 r8:00000002 r7:60000013 r6:eb091d8c r5:848dc800 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:8530fa80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0771dc0 r5:00001000 r4:dfa99000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:848dd400 r5:848dd400 r4:829187f0 r4:00000000 r4:00000000 r5:852def8c r4:852dec00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:353:4535 is blocked on a mutex likely owned by task kworker/1:227:3838. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:354:4536 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:354 state:D stack:0 pid:4536 tgid:4536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0d5d84 r8:00000002 r7:60000013 r6:eb0d5d8c r5:85255400 r4:85255400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85255400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325800 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85255400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852df38c r4:852df000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852df38c r4:8530fc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85255400 r8:8530fcac r7:82804d40 r6:dddced40 r5:dddced60 r4:8530fc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8530fc80 r8:8027ed34 r7:eb0b5e60 r6:852c1680 r5:85255400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d5fb0 to 0xeb0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85325440 INFO: task kworker/0:354:4536 is blocked on a mutex likely owned by task kworker/1:227:3838. [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85256000 r4:829187f0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:8530fd00 9fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:356:4541 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:356 state:D stack:0 pid:4541 tgid:4541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0cdd84 r8:00000002 r7:60000113 r6:eb0cdd8c r5:848de000 r4:848de000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848de000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325a40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848de000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:852dfb8c r4:8530fd80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb0c1d84 r8:00000002 r7:60000113 r6:eb0c1d8c r5:848dec00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85325700 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84878000 r5:84878000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85325c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84878000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dff8c r4:852dfc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852dff8c r4:8530ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84878000 r8:8530ffac r7:82804d40 r6:dddced40 r5:dddced60 r4:8530ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8530ff80 r8:8027ed34 r7:eb0c1e60 r6:85338000 r5:84878000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0edfb0 to 0xeb0edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85325b40 INFO: task kworker/0:358:4544 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 8b38b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:359:4546 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:359 state:D stack:0 pid:4546 tgid:4546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb105d84 r8:00000002 r7:60000113 r6:eb105d8c r5:84878c00 r4:84878c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84878c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb105e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:8501338c r4:85013000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb111d84 r8:00000002 r7:60000013 r6:eb111d8c r5:84879800 r5:84879800 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:852e4f8c r4:852e4c00 r10:00000000 r9:85338180 r8:8027ed34 r7:eb105e60 r6:85338200 r5:84879800 INFO: task kworker/0:360:4549 is blocked on a mutex likely owned by task kworker/1:227:3838. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:361:4550 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:361 state:D stack:0 pid:4550 tgid:4550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0f9d84 r8:00000002 r7:60000113 r6:eb0f9d8c r5:8487a400 r4:8487a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8487a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8530cf80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8487a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb119000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e4b8c r4:852e4800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852e4b8c r4:85338280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487a400 r8:853382ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85338280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85338280 r8:8027ed34 r7:eb111e60 r6:85338300 r5:8487a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f9fb0 to 0xeb0f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85325f40 INFO: task kworker/0:361:4550 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 8c083000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:362 state:D stack:0 pid:4553 tgid:4553 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8487b000 r4:829187f0 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85338380 dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:363:4554 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:363 state:D stack:0 pid:4554 tgid:4554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb141d84 r8:00000002 r7:60000113 r6:eb141d8c r5:8487bc00 r4:8487bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8487bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d800 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8487bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb155000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e5f8c r4:852e5c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852e5f8c r4:85338480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487bc00 r8:853384ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85338480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85338480 r8:8027ed34 r7:eb11de60 r6:85338500 r5:8487bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8533d100 INFO: task kworker/0:363:4554 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 8c4a8000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8487c800 r5:8487c800 r4:829187f0 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d3c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8487c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb13d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85338580 9fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8487d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfa99000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:366:4560 blocked for more than 459 seconds. r5:8487e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb14de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8533d940 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8487e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb169000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e638c r4:852e6000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852e638c r4:85338780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8487e000 r8:853387ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85338780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85338780 r8:8027ed34 r7:eb141e60 r6:85338800 r5:8487e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb14dfb0 to 0xeb14dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8533d680 INFO: task kworker/0:366:4560 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 8d007000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84af0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8533da80 INFO: task kworker/0:367:4562 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 8d007000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:368 state:D stack:0 pid:4564 tgid:4564 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84af1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:852e6f8c r4:852e6c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/1:355:4566 blocked for more than 460 seconds. r5:84af0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:356:4568 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:356 state:D stack:0 pid:4568 tgid:4568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1a1d84 r8:00000002 r7:60000113 r6:eb1a1d8c r5:84af2400 r4:84af2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d980 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84af2400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06df000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f0b8c r4:852f0800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:852f0b8c r4:852c1800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af2400 r8:852c182c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852c1800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c1800 r8:8027ed34 r7:eb199e60 r6:852c1880 r5:84af2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8534b000 INFO: task kworker/1:356:4568 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 8dba7000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85250c00 r4:829187f0 r4:00000000 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0771dc0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 Not tainted 6.15.0-syzkaller #0 r5:8524e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:852e738c r4:85338b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85338b80 r8:8027ed34 r7:eb181e60 r6:852c1980 r5:8524e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead65fb0 to 0xead65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8534d080 INFO: task kworker/0:370:4572 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 8deae000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:371:4574 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:371 state:D stack:0 pid:4574 tgid:4574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eae75d84 r8:00000002 r7:60000113 r6:eae75d8c r5:85256c00 r4:85256c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85256c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534dac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85256c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ff000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f0f8c r4:852f0c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f0f8c r4:85338c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:372 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853c8000 r4:829187f0 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d2c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e778c r4:852e7400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852e778c r4:85338c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c8000 r8:85338cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85338c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85338c80 r8:8027ed34 r7:eae75e60 r6:852c1a80 r5:853c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae7dfb0 to 0xeae7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8534d200 INFO: task kworker/0:372:4575 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 8e043000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:853c9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae8de08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:373:4577 is blocked on a mutex likely owned by task kworker/1:227:3838. r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:853ca400 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0771dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:375:4582 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:375 state:D stack:0 pid:4582 tgid:4582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eaf8dd84 r8:00000002 r7:60000113 r6:eaf8dd8c r5:853c8c00 r4:853c8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853c8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534d640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f038c r4:852f0000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f038c r4:85338e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c8c00 r8:85338e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85338e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85338e00 r8:8027ed34 r7:eae75e60 r6:852c1c00 r5:853c8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf8dfb0 to 0xeaf8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:8534d6c0 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:853cc800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeafa1fb0 to 0xeafa1ff8) INFO: task kworker/0:376:4584 is blocked on a mutex likely owned by task kworker/1:227:3838. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:4586 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:4586 tgid:4586 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafc9d84 r8:00000002 r7:60000113 r6:eafc9d8c r5:853cbc00 r4:853cbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853cbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534dd40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e480b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f178c r4:852f1400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f178c r4:85338f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cbc00 r8:85338f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85338f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85338f00 r8:8027ed34 r7:eae75e60 r6:852c1d00 r5:853cbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc9fb0 to 0xeafc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d60: 80070013 ffffffff r4:e0771dc0 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ce000 r5:853ce000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd9e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:852f138c r4:85338f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ce000 r8:85338fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85338f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85338f80 r8:8027ed34 r7:eafc9e60 r6:852c1d80 r5:853ce000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafd9fb0 to 0xeafd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8534d940 INFO: task kworker/0:378:4589 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 8f2ee000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:853cb000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8521f78c r4:852c1e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cb000 r8:852c1e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:852c1e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852c1e00 r8:8027ed34 r7:eb199e60 r6:852c1e80 r5:853cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff5fb0 to 0xeaff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8534bec0 INFO: task kworker/1:357:4592 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 8f89e000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eb005d84 r8:00000002 r7:60000113 r6:eb005d8c r5:8524ec00 r5:8524ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534de40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8524ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea937000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f1b8c r4:852f1800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f1b8c r4:85357000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524ec00 r8:8535702c r7:82804d40 r6:dddced40 r5:dddced60 r4:85357000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85357000 r8:8027ed34 r7:eafc9e60 r6:852c1f00 r5:8524ec00 r4:00000001 Exception stack(0xeb005fb0 to 0xeb005ff8) task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0771dc0 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:380:4595 blocked for more than 460 seconds. r5:85253c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85253c00 r8:853570ac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:853cec00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r4:e0771dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:382:4598 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:4598 tgid:4598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1bdd84 r8:00000002 r7:60000113 r6:eb1bdd8c r5:853d0c00 r4:853d0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534df80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab45000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f238c r4:852f2000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f238c r4:85357180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d0c00 r8:853571ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85357180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85357180 r8:8027ed34 r7:eb1ade60 r6:852c1080 r5:853d0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1bdfb0 to 0xeb1bdff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:382:4598 is blocked on a mutex likely owned by task kworker/1:227:3838. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:853d2400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535f0c0 r10:61c88647 r9:853d2400 r8:8535722c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:384:4602 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:384 state:D stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1cdd84 r8:00000002 r7:60000013 r6:eb1cdd8c r5:853d1800 r4:853d1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535f300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabad000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:e0771dc0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 task:kworker/0:385 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:00000000 r5:8501338c r4:85013000 r4:847da880 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:4606 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:4606 tgid:4606 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1ddd84 r8:00000002 r7:60000113 r6:eb1ddd8c r5:853d3000 r4:853d3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535f540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f338c r4:852f3000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f338c r4:85357380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d3000 r8:853573ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85357380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85357380 r8:8027ed34 r7:eb1ade60 r6:85369100 r5:853d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1ddfb0 to 0xeb1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535f200 INFO: task kworker/0:386:4606 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9088d000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:853d6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eb1f5d84 r8:00000002 r7:60000013 r6:eb1f5d8c r5:853d5400 r5:853d5400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535f8c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead41000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f3f8c r4:852f3c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f3f8c r4:85357480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d5400 r8:853574ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85357480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85357480 r8:8027ed34 r7:eb1e9e60 r6:85369200 r5:853d5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f5fb0 to 0xeb1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535f600 INFO: task kworker/0:388:4612 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 90d7e000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:389 state:D stack:0 pid:4613 tgid:4613 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853d6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0771d20 to 0xe0771d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r5:00001000 r4:dfa99000 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 r4:853d4800 r5:853d4800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb201e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:391:4616 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:391 state:D stack:0 pid:4616 tgid:4616 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb19dd84 r8:00000002 r7:60000113 r6:eb19dd8c r5:84af3c00 r4:84af3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb19de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535fb40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84af3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f478c r4:852f4400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f478c r4:85357600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af3c00 r8:8535762c r7:82804d40 r6:dddced40 r5:dddced60 r4:85357600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85357600 r8:8027ed34 r7:eb201e60 r6:85357680 r5:84af3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb19dfb0 to 0xeb19dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535f900 INFO: task kworker/0:391:4616 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:84af4800 r5:84af4800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb205e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f4b8c r4:852f4800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f4b8c r4:85357700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af4800 r8:8535772c r7:82804d40 r6:dddced40 r5:dddced60 r4:85357700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85357700 r8:8027ed34 r7:eb201e60 r6:85357780 r5:84af4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb205fb0 to 0xeb205ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8535f9c0 INFO: task kworker/0:392:4619 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 91509000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84af5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:8535fcc0 Call trace: r5:80070013 r4:80239bd0 r4:e0771dc0 r5:00001000 r4:dfa99000 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84af6c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:84af6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 r10:61c88647 r9:84af6c00 r8:8535792c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb18dfb0 to 0xeb18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8534bd80 INFO: task kworker/0:394:4624 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9196a000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:4625 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:4625 tgid:4625 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:eb211d84 r8:00000002 r7:60000013 r6:eb211d8c r5:8487ec00 r5:8487ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:4627 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:4627 tgid:4627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb215d84 r8:00000002 r7:60000113 r6:eb215d8c r5:853d8c00 r4:853d8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853d8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb215e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537b3c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae2f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f5f8c r4:852f5c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f5f8c r4:85357b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d8c00 r8:85357b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85357b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0771d20 to 0xe0771d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:853d9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eae81000 r10:61c88647 r9:853d9800 r8:85357bac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80070013 ffffffff r4:e0771dc0 r5:00001000 r4:dfa99000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:4631 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:4631 tgid:4631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb21dd84 r8:00000002 r7:60000013 r6:eb21dd8c r5:853da400 r4:853da400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853da400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb21de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537b580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853da400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae51000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f638c r4:852f6000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f638c r4:85357c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853da400 r8:85357c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85357c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85357c00 r8:8027ed34 r7:eb219e60 r6:85369480 r5:853da400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb21dfb0 to 0xeb21dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8537b400 INFO: task kworker/0:398:4631 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 92437000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:853db000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537b780 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853db000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f6b8c r4:852f6800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f6b8c r4:85357c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853db000 r8:85357cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85357c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85357c80 r8:8027ed34 r7:eb219e60 r6:85369500 r5:853db000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb221fb0 to 0xeb221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8537b480 INFO: task kworker/0:399:4633 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 92437000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:400 state:D stack:0 pid:4635 tgid:4635 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853dbc00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:401 state:D stack:0 pid:4637 tgid:4637 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853dc800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb20de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537b980 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf07000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f6f8c r4:852f6c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f6f8c r4:85357d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853dc800 r8:85357dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85357d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85357d80 r8:8027ed34 r7:eb225e60 r6:85369600 r5:853dc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb20dfb0 to 0xeb20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8537b880 INFO: task kworker/0:401:4637 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 92f71000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e0771dc0 r5:00001000 r4:dfa99000 r4:847da880 1fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb22dd84 r8:00000002 r7:60000113 r6:eb22dd8c r5:853dd400 r5:853dd400 r4:829187f0 r4:00000000 r9:83018205 r8:853dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 r10:61c88647 r9:853dd400 r8:853696ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:4641 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:4641 tgid:4641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb235d84 r8:00000002 r7:60000013 r6:eb235d8c r5:853dec00 r4:853dec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853dec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537bbc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f778c r4:852f7400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f778c r4:85357e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853dec00 r8:85357e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85357e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85357e00 r8:8027ed34 r7:eb225e60 r6:85369780 r5:853dec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb235fb0 to 0xeb235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8537b900 INFO: task kworker/0:402:4641 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:403 state:D stack:0 pid:4643 tgid:4643 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853d8000 r4:829187f0 r4:00000000 r9:83018005 r8:853d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 r10:00000000 r9:85357e80 r8:8027ed34 r7:eb235e60 r6:85369800 r5:853d8000 r4:8537ba00 INFO: task kworker/0:403:4643 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9350f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:404 state:D stack:0 pid:4645 tgid:4645 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853de000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537bd80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853de000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf67000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f7b8c r4:852f7800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f7b8c r4:85357f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853de000 r8:85357f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85357f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85357f00 r8:8027ed34 r7:eb239e60 r6:85369880 r5:853de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb23dfb0 to 0xeb23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8537bc00 INFO: task kworker/0:404:4645 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9350f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r5:8501338c r4:85013000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-syzkaller #0 r5:853cd400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb229e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:852f838c r4:85357f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cd400 r8:85357fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85357f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85357f80 r8:8027ed34 r7:eb239e60 r6:85369900 r5:853cd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb229fb0 to 0xeb229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8537bd00 INFO: task kworker/0:405:4648 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 93b1e000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8501338c r4:85013000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d0000 r5:853d0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85378000 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 93b1e000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8501338c r4:85013000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eb245d84 r8:00000002 r7:60000013 r6:eb245d8c r5:853e0000 r5:853e0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:853e0c00 r5:853e0c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb249e08 r9:83018005 r8:853e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f8b8c r4:852f8800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f8b8c r4:85378080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e0c00 r8:853780ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85378080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378080 r8:8027ed34 r7:eb241e60 r6:85369b00 r5:853e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb249fb0 to 0xeb249ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8537b700 INFO: task kworker/0:407:4653 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 94056000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:853e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 r10:61c88647 r9:853e1800 r8:8537812c r7:82804d40 r6:dddced40 r5:dddced60 r4:8537e040 Call trace: Exception stack(0xe0771d20 to 0xe0771d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:409:4657 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:409 state:D stack:0 pid:4657 tgid:4657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb271d84 r8:00000002 r7:60000113 r6:eb271d8c r5:853e2400 r4:853e2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537e500 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb267000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f938c r4:852f9000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f938c r4:85378180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e2400 r8:853781ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85378180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378180 r8:8027ed34 r7:eb259e60 r6:85369c00 r5:853e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb271fb0 to 0xeb271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8537e240 INFO: task kworker/0:409:4657 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 94680000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e3000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb279e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:852f978c r4:852f9400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f978c r4:85378200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e3000 r8:8537822c r7:82804d40 r6:dddced40 r5:dddced60 r4:85378200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378200 r8:8027ed34 r7:eb271e60 r6:85369c80 r5:853e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb279fb0 to 0xeb279ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8537e240 INFO: task kworker/0:410:4659 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:85378280 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:412:4663 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:412 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb29dd84 r8:00000002 r7:60000113 r6:eb29dd8c r5:853e5400 r4:853e5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853e5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537e8c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb29f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Call trace: r4:e0771dc0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:853e6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537ea80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:852fa38c r4:85378380 r4:8537e740 INFO: task kworker/0:413:4665 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r4:848e0c00 r5:848e0c00 r4:829187f0 r4:00000000 r10:00000000 r9:85378400 r8:8027ed34 r7:eb2b5e60 r6:85378480 r5:848e0c00 r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 task:kworker/0:415 state:D stack:0 pid:4669 tgid:4669 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:853e3c00 r4:829187f0 r9:83018205 r8:853e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e5000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844d3f8c r4:844d3c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844d3f8c r4:85369f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e3c00 r8:85369f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85369f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85369f00 r8:8027ed34 r7:eb245e60 r6:85369f80 r5:853e3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c9fb0 to 0xeb2c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85384900 INFO: task kworker/1:360:4671 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dfa99000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:848e0000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e0771dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:eac59d84 r8:00000002 r7:60000013 r6:eac59d8c r5:848e3000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 r4:85378600 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8537ee80 INFO: task kworker/0:416:4677 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 1d60: 80070013 ffffffff r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) task:kworker/0:417 state:D stack:0 pid:4679 tgid:4679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:848e4800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r10:61c88647 r9:848e4800 r8:8537872c r7:82804d40 r6:dddced40 r5:dddced60 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:848e5400 r4:829187f0 r4:00000000 r5:852fb38c r4:852fb000 r4:85367280 INFO: task kworker/0:418:4681 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 96050000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848e6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397100 r10:61c88647 r9:848e6000 r8:853760ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb039d84 r8:00000002 r7:60000013 r6:eb039d8c r5:848e6c00 r5:848e6c00 r4:829187f0 r4:00000000 r9:83018005 r8:848e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 r10:00000000 r9:85378980 r8:8027ed34 r7:eb231e60 r6:85378a00 r5:848e6c00 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0771dc0 r4:00000000 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:420:4686 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:420 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb041d84 r8:00000002 r7:60000113 r6:eb041d8c r5:848e1800 r4:848e1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848e1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367dc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9c1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530438c r4:85304000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530438c r4:85378a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e1800 r8:85378aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85378a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378a80 r8:8027ed34 r7:eb231e60 r6:85378b00 r5:848e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb041fb0 to 0xeb041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853676c0 INFO: task kworker/0:420:4686 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 96608000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84af3000 r8:85378bac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:4689 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:4689 tgid:4689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb0ddd84 r8:00000002 r7:60000113 r6:eb0ddd8c r5:84af6000 r4:84af6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84af6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85367e80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84af6000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530478c r4:85304400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530478c r4:85378c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84af6000 r8:85378cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85378c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378c80 r8:8027ed34 r7:eb041e60 r6:85378d00 r5:84af6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0ddfb0 to 0xeb0ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85367940 INFO: task kworker/0:422:4689 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 96a43000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da880 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848e3c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85378d80 r8:8027ed34 r7:eb0dde60 r6:85378e00 r5:848e3c00 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:848e2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853770c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530538c r4:85305000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530538c r4:85378e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848e2400 r8:85378eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85378e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378e80 r8:8027ed34 r7:eb2f9e60 r6:85378f00 r5:848e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85367e00 INFO: task kworker/0:424:4694 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 96ea8000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:425 state:D stack:0 pid:4696 tgid:4696 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848f0000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537be40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa91000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85304f8c r4:85304c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85304f8c r4:85378f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f0000 r8:85378fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85378f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378f80 r8:8027ed34 r7:eb2e9e60 r6:85380000 r5:848f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85377000 INFO: task kworker/0:425:4696 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 96ea8000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 task:kworker/0:426 state:D stack:0 pid:4699 tgid:4699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb301d84 r8:00000002 r7:60000013 r6:eb301d8c r5:848f0c00 r4:848f0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb301e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85377540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac25000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85305b8c r4:85305800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85380080 r8:8027ed34 r7:eb2e9e60 r6:85380100 r5:848f0c00 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:848f1800 r5:848f1800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r5:00001000 r4:eabd7000 r10:61c88647 r9:848f1800 r8:853801ac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:428 state:D stack:0 pid:4702 tgid:4702 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848f2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb305e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85377640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac5d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85305f8c r4:85305c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85305f8c r4:85380280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f2400 r8:853802ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85380280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85380280 r8:8027ed34 r7:eb301e60 r6:85380300 r5:848f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb305fb0 to 0xeb305ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853773c0 INFO: task kworker/0:428:4702 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9775b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:848f3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eac9d000 r7:dddced40 r6:83018000 r5:8530638c r4:85380380 Exception stack(0xdf885fb0 to 0xdf885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85377440 INFO: task kworker/0:429:4704 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9775b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 r5:848f3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e070de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85377ac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85306b8c r4:85306800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85306b8c r4:85380480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f3c00 r8:853804ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85380480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85380480 r8:8027ed34 r7:df885e60 r6:85380500 r5:848f3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe070dfb0 to 0xe070dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85377840 INFO: task kworker/0:430:4706 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9775b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0771fb0 to 0xe0771ff8) task:kworker/0:431 state:D stack:0 pid:4708 tgid:4708 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848f4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8530678c r4:85306400 r10:00000000 r9:85380580 r8:8027ed34 r7:e070de60 r6:85380600 r5:848f4800 r4:85377780 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r5:8501338c r4:85013000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:848f5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85377c80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb04b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85306f8c r4:85306c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85306f8c r4:85380680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f5400 r8:853806ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85380680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85380680 r8:8027ed34 r7:e070de60 r6:85380700 r5:848f5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb30dfb0 to 0xeb30dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85377940 INFO: task kworker/0:432:4710 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 97e7b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) task:kworker/0:433 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848f6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8530738c r4:85380780 1fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:4714 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:4714 tgid:4714 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb315d84 r8:00000002 r7:60000013 r6:eb315d8c r5:848f6c00 r4:848f6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848f6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85377f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb093000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530778c r4:85307400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8530778c r4:85380880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f6c00 r8:853808ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85380880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85380880 r8:8027ed34 r7:eb311e60 r6:85380900 r5:848f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85377b80 INFO: task kworker/0:434:4714 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85440c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85307b8c r4:85307800 r10:00000000 r9:85380980 r8:8027ed34 r7:eb315e60 r6:85380a00 r5:85440c00 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:436:4718 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:436 state:D stack:0 pid:4718 tgid:4718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb321d84 r8:00000002 r7:60000013 r6:eb321d8c r5:85440000 r4:85440000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85440000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85394100 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85440000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0af000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85307f8c r4:85307c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85307f8c r4:85380a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85440000 r8:85380aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85380a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85380a80 r8:8027ed34 r7:eb31de60 r6:85380b00 r5:85440000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb321fb0 to 0xeb321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85377b80 INFO: task kworker/0:436:4718 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d60: 80070013 ffffffff r4:e0771dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85441800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85380b80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85443000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb329e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85394540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85443000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543c38c r4:8543c000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8543c38c r4:85380c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85443000 r8:85380cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85380c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85380c80 r8:8027ed34 r7:eb325e60 r6:85380d00 r5:85443000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb329fb0 to 0xeb329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85394080 INFO: task kworker/0:438:4721 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 98e96000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85444800 r5:85444800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853972c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85444800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0e3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85408b8c r4:85408800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85408b8c r4:85376100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85444800 r8:8537612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85376100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85376100 r8:8027ed34 r7:eb2ede60 r6:85380d80 r5:85444800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb331fb0 to 0xeb331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85397040 INFO: task kworker/1:363:4724 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 98e96000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/1:364:4726 blocked for more than 461 seconds. r5:85442400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85442400 r8:853761ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85445400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8543cb8c r4:85380e80 5fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:4730 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:4730 tgid:4730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb319d84 r8:00000002 r7:60000013 r6:eb319d8c r5:85446000 r4:85446000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85446000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85394b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85446000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb117000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543cf8c r4:8543cc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8543cf8c r4:85380f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85446000 r8:85380fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85380f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85380f80 r8:8027ed34 r7:eb335e60 r6:8402d400 r5:85446000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb319fb0 to 0xeb319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85394800 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85446c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8543d38c r4:830cd400 r10:61c88647 r9:85446c00 r8:830cd42c r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd400 r8:8027ed34 r7:eb319e60 r6:830cd380 r5:85446c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb32dfb0 to 0xeb32dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85394980 INFO: task kworker/0:441:4732 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 99655000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 INFO: task kworker/0:442:4735 blocked for more than 461 seconds. r5:85448000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85394e80 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85448c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb345fb0 to 0xeb345ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85394b00 INFO: task kworker/0:443:4736 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 99d5e000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:444:4738 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:444 state:D stack:0 pid:4738 tgid:4738 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8544a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385180 r10:61c88647 r9:8544a400 r8:8539922c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:444:4738 is blocked on a mutex likely owned by task kworker/1:227:3838. r4:82ac11e4 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb34dd84 r8:00000002 r7:60000113 r6:eb34dd8c r5:8544b000 r5:8544b000 r4:829187f0 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8543eb8c r4:85399300 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:4742 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:4742 tgid:4742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb33dd84 r8:00000002 r7:60000113 r6:eb33dd8c r5:85449800 r4:85449800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85449800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb33de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397780 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85449800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb17b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540938c r4:85409000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8540938c r4:85399400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85449800 r8:8539942c r7:82804d40 r6:dddced40 r5:dddced60 r4:85399400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85399400 r8:8027ed34 r7:eb34de60 r6:85399480 r5:85449800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb33dfb0 to 0xeb33dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85385400 INFO: task kworker/0:446:4742 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9a2ab000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/0:447:4743 blocked for more than 461 seconds. r5:8544c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8543e38c r4:8543e000 r4:85399500 r10:00000000 r9:85399500 r8:8027ed34 r7:eb34de60 r6:85399580 r5:8544c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb355fb0 to 0xeb355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85385380 INFO: task kworker/0:447:4743 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9a2ab000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:448:4747 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:448 state:D stack:0 pid:4747 tgid:4747 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb351d84 r8:00000002 r7:60000113 r6:eb351d8c r5:8544bc00 r4:8544bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8544bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb351e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385880 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8544bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543e78c r4:8543e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8543e78c r4:85399600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8544bc00 r8:8539962c r7:82804d40 r6:dddced40 r5:dddced60 r4:85399600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85399600 r8:8027ed34 r7:eb34de60 r6:85399680 r5:8544bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb351fb0 to 0xeb351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853856c0 INFO: task kworker/0:448:4747 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9a7fb000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:449:4749 blocked for more than 461 seconds. Workqueue: events bpf_prog_free_deferred r5:8544e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:8544e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 r5:8543f38c r4:8543f000 r10:61c88647 r9:8544e000 r8:8539972c r7:82804d40 r6:dddced40 r5:dddced60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:e0771dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r5:8501338c r4:85013000 r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) r4:8497f8c0 INFO: task kworker/0:450:4750 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:450 state:D stack:0 pid:4750 tgid:4750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb369d84 r8:00000002 r7:60000113 r6:eb369d8c r5:8544ec00 r4:8544ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8544ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85385b40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8544ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543ef8c r4:8543ec00 r4:00000001 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:8497f8c0 r5:8544d400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:8544d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r7:ddde2d40 r6:83018200 r5:85409f8c r4:85376200 r10:00000000 r9:85376200 r8:8027ed34 r7:eb2ede60 r6:85399900 r5:8544d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 r5:85443c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85443c00 r7:00000000 r6:83018000 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb383000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543f78c r4:8543f400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8543f78c r4:85399980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85443c00 r8:853999ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85399980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85399980 r8:8027ed34 r7:eb35de60 r6:85399a00 r5:85443c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb38dfb0 to 0xeb38dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85385ac0 INFO: task kworker/0:451:4754 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9c44f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:4756 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:4756 tgid:4756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb381d84 r8:00000002 r7:60000013 r6:eb381d8c r5:85458000 r4:85458000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85458000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb381e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9c44f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:4757 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:453 state:D stack:0 pid:4757 tgid:4757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafd1d84 r8:00000002 r7:60000113 r6:eafd1d8c r5:85458c00 r4:85458c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85458c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafd1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85394440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85458c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8543ff8c r4:8543fc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8543ff8c r4:85399b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85458c00 r8:85399bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85399b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85399b80 r8:8027ed34 r7:eb381e60 r6:85399c00 r5:85458c00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:8501338c r4:85013000 r4:847da880 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:454 state:D stack:0 pid:4760 tgid:4760 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85459800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf95fb0 to 0xeaf95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85394dc0 INFO: task kworker/0:454:4760 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9d156000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:4761 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:4761 tgid:4761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eafe1d84 r8:00000002 r7:60000013 r6:eafe1d8c r5:8545a400 r4:8545a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8545a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397f00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb00dd84 r8:00000002 r7:60000113 r6:eb00dd8c r5:8545bc00 r5:8545bc00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e300 r7:dddced40 r6:83018000 r5:8548478c r4:85399e80 dfa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:457:4766 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:457 state:D stack:0 pid:4766 tgid:4766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb1d1d84 r8:00000002 r7:60000013 r6:eb1d1d8c r5:8545d400 r4:8545d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8545d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ea80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8545d400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85484f8c r4:85484c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85484f8c r4:85399f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8545d400 r8:85399fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85399f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85399f80 r8:8027ed34 r7:eafe1e60 r6:853a3000 r5:8545d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d1fb0 to 0xeb1d1ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:457:4766 is blocked on a mutex likely owned by task kworker/1:227:3838. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe0771fb0 to 0xe0771ff8) task:kworker/0:458 state:D stack:0 pid:4768 tgid:4768 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853eb000 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539eb40 r7:dddced40 r6:83018000 r5:85484b8c r4:853a3080 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539e240 INFO: task kworker/0:458:4768 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9e17d000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:4771 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:366 state:D stack:0 pid:4771 tgid:4771 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:853ea400 r5:853ea400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:853ea400 r8:8537632c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r5:8501338c r4:85013000 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 Not tainted 6.15.0-syzkaller #0 r5:853ebc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538e300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab3d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540af8c r4:8540ac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540af8c r4:85376400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ebc00 r8:8537642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85376400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85376400 r8:8027ed34 r7:eb1e5e60 r6:85376480 r5:853ebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1edfb0 to 0xeb1edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85397840 INFO: task kworker/1:367:4772 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9e61a000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/1:368:4773 blocked for more than 461 seconds. r4:853ec800 r5:853ec800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538e180 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:853ec800 r8:8537652c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r5:853ed400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:853ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85376600 r8:8027ed34 r7:eb1ede60 r6:85376680 r5:853ed400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0771d20 to 0xe0771d68) 1d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:00000000 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Call trace: r5:853ee000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfcc7000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85376700 r8:8027ed34 r7:eb251e60 r6:85376780 r5:853ee000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 9eb26000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r4:e0771dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:853eec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:853eec00 r8:853a312c r7:82804d40 r6:dddced40 r5:dddced60 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80070013 ffffffff r4:e0771dc0 r4:00000000 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:371 state:D stack:0 pid:4784 tgid:4784 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853e8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538e5c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead11000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540b78c r4:8540b400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540b78c r4:85376880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8000 r8:853768ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85376880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85376880 r8:8027ed34 r7:eb295e60 r6:85376900 r5:853e8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8538e440 INFO: task kworker/1:371:4784 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9ee76000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:460 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:853e9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018005 r8:853e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8548538c r4:853a3180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e9800 r8:853a31ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a3180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a3180 r8:8027ed34 r7:eb2d9e60 r6:85376980 r5:853e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f5fb0 to 0xeb2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539ee00 INFO: task kworker/0:460:4785 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9f258000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:4788 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:4788 tgid:4788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb399d84 r8:00000002 r7:60000113 r6:eb399d8c r5:8324c800 r4:8324c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538eb80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324c800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead7d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540bb8c r4:8540b800 r10:61c88647 r9:8324c800 r8:85376a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8538e800 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:853e8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb39de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ec00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead53000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548578c r4:85485400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8548578c r4:853a3200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8c00 r8:853a322c r7:82804d40 r6:dddced40 r5:dddced60 r4:853a3200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a3200 r8:8027ed34 r7:eb2d9e60 r6:85376b00 r5:853e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb39dfb0 to 0xeb39dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539ee80 INFO: task kworker/0:461:4789 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9f857000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8501338c r4:85013000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb2e5d84 r8:00000002 r7:60000013 r6:eb2e5d8c r5:8545c800 r5:8545c800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e5e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8545c800 r8:853a32ac r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8545b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb395e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84759ac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8545b000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaddb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85485f8c r4:85485c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85485f8c r4:853a3380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8545b000 r8:853a33ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a3380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a3380 r8:8027ed34 r7:eb2d9e60 r6:853a3400 r5:8545b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85396080 INFO: task kworker/0:463:4795 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: 9fb98000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 r4:00000001 r4:8497f8c0 task:kworker/0:464 state:D stack:0 pid:4796 tgid:4796 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8545ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:e0517000 r10:61c88647 r9:8545ec00 r8:853a34ac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:464:4796 is blocked on a mutex likely owned by task kworker/1:227:3838. 1d60: 80070013 ffffffff r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:465:4798 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:465 state:D stack:0 pid:4798 tgid:4798 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3a9d84 r8:00000002 r7:60000013 r6:eb3a9d8c r5:8545e000 r4:8545e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8545e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85396300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8545e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae0b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548678c r4:85486400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8548678c r4:853a3580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8545e000 r8:853a35ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a3580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a039c000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85460000 r5:85460000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85460000 r8:853a36ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85396440 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:467:4802 blocked for more than 461 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb391d84 r8:00000002 r7:60000013 r6:eb391d8c r5:85460c00 r4:85460c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85460c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb391e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85396640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85460c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae39000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85486f8c r4:85486c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85486f8c r4:853a3780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85460c00 r8:853a37ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a3780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a3780 r8:8027ed34 r7:eb3a5e60 r6:853a3800 r5:85460c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb391fb0 to 0xeb391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85396440 INFO: task kworker/0:467:4802 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a0900000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:85461800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85396780 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85461800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae87000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548738c r4:85487000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8548738c r4:853a3880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85461800 r8:853a38ac r7:82804d40 r6:dddced40 r5:dddced60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:468:4803 is blocked on a mutex likely owned by task kworker/1:227:3838. [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85463c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85396c40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85463c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548778c r4:85487400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8548778c r4:853a3980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85463c00 r8:853a39ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a3980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a3980 r8:8027ed34 r7:eb3a5e60 r6:853a3a00 r5:85463c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb37dfb0 to 0xeb37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85396b80 INFO: task kworker/0:469:4808 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a0e33000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8501338c r4:85013000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85464800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:853a3a80 Exception stack(0xeb3bdfb0 to 0xeb3bdff8) r4:85396b80 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 Not tainted 6.15.0-syzkaller #0 r5:85465400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85396e80 INFO: task kworker/0:471:4812 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a1235000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:853f1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8549078c r4:85490400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85396e80 INFO: task kworker/0:472:4813 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a1235000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:373:4814 blocked for more than 461 seconds. r10:829187f4 r9:eb365d84 r8:00000002 r7:60000113 r6:eb365d8c r5:853f0000 r5:853f0000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:853f0000 r8:85376c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:853f2400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85376d00 r8:8027ed34 r7:eb365e60 r6:85376d80 r5:853f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c5fb0 to 0xeb3c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8538eb40 INFO: task kworker/1:374:4815 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a16e5000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/0:473:4818 blocked for more than 462 seconds. r5:853f3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa93000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85490b8c r4:85490800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85490b8c r4:853a3d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f3000 r8:853a3d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853a3d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a3d00 r8:8027ed34 r7:eb3b5e60 r6:85376e00 r5:853f3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c9fb0 to 0xeb3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539b100 INFO: task kworker/0:473:4818 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/0:474:4819 blocked for more than 462 seconds. r5:853f3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:853a3d80 r8:8027ed34 r7:eb3c9e60 r6:85376e80 r5:853f3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3cdfb0 to 0xeb3cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539b100 INFO: task kworker/0:474:4819 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a19ac000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/0:475:4821 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:4821 tgid:4821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3d1d84 r8:00000002 r7:60000113 r6:eb3d1d8c r5:853f4800 r4:853f4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b4c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85490f8c r4:85490c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85490f8c r4:853a3e00 r4:853a3e00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:853f5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:853a3e80 r8:8027ed34 r7:eb3cde60 r6:85376f80 r5:853f5400 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8497f8c0 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3d9d84 r8:00000002 r7:60000013 r6:eb3d9d8c r5:853f6000 r4:853f6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539bd00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf09000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549278c r4:85492400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549278c r4:853a3f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f6000 r8:853a3f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853a3f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a3f00 r8:8027ed34 r7:eb3d5e60 r6:83c74700 r5:853f6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d9fb0 to 0xeb3d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539b580 INFO: task kworker/0:477:4825 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:853f6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8549238c r4:85492000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:375:4829 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:4829 tgid:4829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb3f5d84 r8:00000002 r7:60000113 r6:eb3f5d8c r5:853f0c00 r4:853f0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ba00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:853f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeb3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85491f8c r4:85491c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85491f8c r4:853a0080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f0c00 r8:853a00ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853a0080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r4:00000000 r5:00001000 r4:dfa99000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f8000 r5:853f8000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:4834 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:4834 tgid:4834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb405d84 r8:00000002 r7:60000113 r6:eb405d8c r5:853f9800 r4:853f9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84759cc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf6f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549338c r4:85493000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549338c r4:8538f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f9800 r8:8538f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8538f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538f080 r8:8027ed34 r7:eb3d9e60 r6:853a0280 r5:853f9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb405fb0 to 0xeb405ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539bb00 INFO: task kworker/0:479:4834 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a29f4000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:4836 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:4836 tgid:4836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb40dd84 r8:00000002 r7:60000113 r6:eb40dd8c r5:853f8c00 r4:853f8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853f8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539be00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf35000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85492b8c r4:85492800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85492b8c r4:8538f100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853f8c00 r8:8538f12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8538f100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538f100 r8:8027ed34 r7:eb405e60 r6:853a0300 r5:853f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb40dfb0 to 0xeb40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539bb80 INFO: task kworker/0:480:4836 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a29f4000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:481:4837 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:4837 tgid:4837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb411d84 r8:00000002 r7:60000113 r6:eb411d8c r5:853fb000 r4:853fb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fb000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539bf40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf51000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85492f8c r4:85492c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85492f8c r4:8538f180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fb000 r8:8538f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8538f180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538f180 r8:8027ed34 r7:eb405e60 r6:853a0380 r5:853fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb411fb0 to 0xeb411ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539bb80 INFO: task kworker/0:481:4837 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a2e7f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:4839 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:4839 tgid:4839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb419d84 r8:00000002 r7:60000113 r6:eb419d8c r5:853fa400 r4:853fa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fa400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb419e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853aa600 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb087000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8549478c r4:8538f200 r10:61c88647 r9:853fa400 r8:8538f22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8538f200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538f200 r8:8027ed34 r7:eb405e60 r6:853a0400 r5:853fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb419fb0 to 0xeb419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8539bdc0 INFO: task kworker/0:482:4839 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a2e7f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:4841 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:483 state:D stack:0 pid:4841 tgid:4841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb421d84 r8:00000002 r7:60000013 r6:eb421d8c r5:853fbc00 r4:853fbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb421e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85396f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549378c r4:85493400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549378c r4:8538f280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fbc00 r8:8538f2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8538f280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538f280 r8:8027ed34 r7:eb419e60 r6:853a0480 r5:853fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb421fb0 to 0xeb421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85396e80 INFO: task kworker/0:483:4841 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a331b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:4843 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:4843 tgid:4843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb429d84 r8:00000002 r7:60000113 r6:eb429d8c r5:853fc800 r4:853fc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fc800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb429e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853aa0c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85493b8c r4:85493800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85493b8c r4:8538f300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fc800 r8:8538f32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8538f300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538f300 r8:8027ed34 r7:eb419e60 r6:853a0500 r5:853fc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb429fb0 to 0xeb429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853aa040 INFO: task kworker/0:484:4843 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a3994000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:4845 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:4845 tgid:4845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb42dd84 r8:00000002 r7:60000113 r6:eb42dd8c r5:853fe000 r4:853fe000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fe000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853aa380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb023000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85493f8c r4:85493c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85493f8c r4:8538f380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fe000 r8:8538f3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8538f380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538f380 r8:8027ed34 r7:eb419e60 r6:853a0580 r5:853fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb42dfb0 to 0xeb42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853aa140 INFO: task kworker/0:485:4845 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a3994000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:377:4847 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:377 state:D stack:0 pid:4847 tgid:4847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb431d84 r8:00000002 r7:60000113 r6:eb431d8c r5:853fd400 r4:853fd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fd400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb431e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b0780 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeb431fb0 to 0xeb431ff8) INFO: task kworker/1:377:4847 is blocked on a mutex likely owned by task kworker/1:227:3838. r5:80070013 r4:80239bd0 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:4849 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:4849 tgid:4849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb439d84 r8:00000002 r7:60000013 r6:eb439d8c r5:853fec00 r4:853fec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:853fec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853aa4c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:853fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb045000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549438c r4:85494000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549438c r4:8538f400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853fec00 r8:8538f42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8538f400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538f400 r8:8027ed34 r7:eb419e60 r6:853a0700 r5:853fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb439fb0 to 0xeb439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:486:4849 is blocked on a mutex likely owned by task kworker/1:227:3838. r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:854b0c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:8538f480 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853aa480 INFO: task kworker/0:487:4852 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a40fa000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:4854 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:4854 tgid:4854 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb389d84 r8:00000002 r7:60000113 r6:eb389d8c r5:854b1800 r4:854b1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb389e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8549538c r4:85495000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854b2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853aab80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe97000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549578c r4:85495400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549578c r4:8538f580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b2400 r8:8538f5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8538f580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538f580 r8:8027ed34 r7:eb389e60 r6:853a0880 r5:854b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb43dfb0 to 0xeb43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853aa340 INFO: task kworker/0:489:4857 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a48b6000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 r4:00000000 r5:8501338c r4:85013000 r4:847da880 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:854b3000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:85495b8c r4:85495800 r4:8538f600 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853aa980 INFO: task kworker/0:490:4859 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a4cfa000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:854b3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:854b3c00 r8:8538f6ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/0:492:4862 blocked for more than 462 seconds. r5:854b4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb44dfb0 to 0xeb44dff8) INFO: task kworker/0:492:4862 is blocked on a mutex likely owned by task kworker/1:227:3838. Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a50ef000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:493:4864 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:493 state:D stack:0 pid:4864 tgid:4864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb425d84 r8:00000002 r7:60000113 r6:eb425d8c r5:854b5400 r4:854b5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb425e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8538f780 r8:8027ed34 r7:eb449e60 r6:853a0a80 r5:854b5400 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) task:kworker/1:378 state:D stack:0 pid:4866 tgid:4866 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854b6000 r4:829187f0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:854b6000 r8:853a0b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a0b00 r8:8027ed34 r7:eb3c5e60 r6:853a0b80 r5:854b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb451fb0 to 0xeb451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853b06c0 INFO: task kworker/1:378:4866 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a5533000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:4869 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:4869 tgid:4869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb455d84 r8:00000002 r7:60000113 r6:eb455d8c r5:854b6c00 r5:854b6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a4600 r7:dddced40 r6:83018000 r5:85496b8c r4:8538f800 5fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb459d84 r8:00000002 r7:60000113 r6:eb459d8c r5:854b0000 r4:854b0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb459e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539b940 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549738c r4:85497000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549738c r4:8538f880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b0000 r8:8538f8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8538f880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538f880 r8:8027ed34 r7:eb455e60 r6:853a0c80 r5:854b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb459fb0 to 0xeb459ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853aa800 INFO: task kworker/0:495:4871 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a90c00 r4:829187f0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84a90c00 r8:8538f92c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a91800 r4:829187f0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84a91800 r8:8538f9ac r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a5808000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:498:4878 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:498 state:D stack:0 pid:4878 tgid:4878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb475d84 r8:00000002 r7:60000113 r6:eb475d8c r5:84a90000 r4:84a90000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a90000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8538fa00 r8:8027ed34 r7:eb469e60 r6:853a0e00 r5:84a90000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a93c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb479e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8538fa80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:499:4879 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a5bb9000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 Not tainted 6.15.0-syzkaller #0 r5:84a93000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb481e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a6200 INFO: task kworker/0:500:4881 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a5e3b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a95400 r5:84a95400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84a95400 r8:8538fbac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: a5e3b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:8501338c r4:85013000 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:4884 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:4884 tgid:4884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb48dd84 r8:00000002 r7:60000113 r6:eb48dd8c r5:84a92400 r4:84a92400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a92400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb48de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6700 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a92400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549878c r4:85498400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549878c r4:8538fc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a92400 r8:8538fc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8538fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538fc00 r8:8027ed34 r7:eb489e60 r6:853bb000 r5:84a92400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb48dfb0 to 0xeb48dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a63c0 INFO: task kworker/0:502:4884 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:e0771dc0 r5:00001000 r4:dfa99000 r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 r5:84a96c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 r5:84a94800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a64c0 INFO: task kworker/0:504:4890 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a6463000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:505:4891 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:505 state:D stack:0 pid:4891 tgid:4891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb49dd84 r8:00000002 r7:60000113 r6:eb49dd8c r5:84a96000 r4:84a96000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a96000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6bc0 r10:61c88647 r9:84a96000 r8:8538fdac r7:82804d40 r6:dddced40 r5:dddced60 r4:853a6900 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:83a84800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6d40 r10:61c88647 r9:83a84800 r8:8538fe2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r5:8501338c r4:85013000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4a5d84 r8:00000002 r7:60000113 r6:eb4a5d8c r5:854b8000 r4:854b8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854b8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b0080 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb11f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549a78c r4:8549a400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549a78c r4:8538fe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854b8000 r8:8538feac r7:82804d40 r6:dddced40 r5:dddced60 r4:8538fe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538fe80 r8:8027ed34 r7:eb4a1e60 r6:853bb280 r5:854b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a6b40 INFO: task kworker/0:507:4895 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a6eb8000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:508:4897 blocked for more than 462 seconds. r5:854b9800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0771fb0 to 0xe0771ff8) task:kworker/0:509 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85466c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85466c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853a6f80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85466c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549a38c r4:8549a000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549a38c r4:8538ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85466c00 r8:8538ffac r7:82804d40 r6:dddced40 r5:dddced60 r4:8538ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8538ff80 r8:8027ed34 r7:eb4a5e60 r6:853b7000 r5:85466c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f1fb0 to 0xeb3f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853a6cc0 INFO: task kworker/0:509:4898 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a726b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 Not tainted 6.15.0-syzkaller #0 r5:854b8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853bcd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d60: 80070013 ffffffff r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:4902 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4b5d84 r8:00000002 r7:60000113 r6:eb4b5d8c r5:854bb000 r4:854bb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854bb000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c10c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:eb145000 r7:dddced40 r6:83018000 r5:8549af8c r4:853b7080 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d60: 80070013 ffffffff r4:e0771dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 Not tainted 6.15.0-syzkaller #0 r5:854bbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853aa040 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 r5:854bc800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8549b78c r4:8549b400 r10:00000000 r9:853b7180 r8:8027ed34 r7:eb4b5e60 r6:853bb580 r5:854bc800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853c1100 INFO: task kworker/0:512:4907 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a76df000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:4908 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:4908 tgid:4908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4a9d84 r8:00000002 r7:60000113 r6:eb4a9d8c r5:85466000 r4:85466000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85466000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1340 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85466000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/0:514:4912 blocked for more than 462 seconds. r5:85463000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c15c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85463000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb187000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549bb8c r4:8549b800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549bb8c r4:853b7300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85463000 r8:853b732c r7:82804d40 r6:dddced40 r5:dddced60 r4:853b7300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b7300 r8:8027ed34 r7:eb4bde60 r6:853b7380 r5:85463000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853c12c0 INFO: task kworker/0:514:4912 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:82ac11e4 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:854bd400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:853b7400 r8:8027ed34 r7:eb45de60 r6:853bb600 r5:854bd400 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:8501338c r4:85013000 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:854be000 r5:854be000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a84b6000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:517:4917 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:517 state:D stack:0 pid:4917 tgid:4917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4d9d84 r8:00000002 r7:60000113 r6:eb4d9d8c r5:854bec00 r4:854bec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854bec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:4918 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:4918 tgid:4918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4ddd84 r8:00000002 r7:60000113 r6:eb4ddd8c r5:854c0000 r4:854c0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:518:4918 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a84b6000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854c1800 r5:854c1800 r4:829187f0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c1800 r8:853b762c r7:82804d40 r6:dddced40 r5:dddced60 r4:853b7600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b7600 r8:8027ed34 r7:eb4d9e60 r6:853bb800 r5:854c1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e5fb0 to 0xeb4e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853c1800 INFO: task kworker/0:519:4920 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:854c0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647400 r10:61c88647 r9:854c0c00 r8:853bb8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d20: a88cf000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/0:520:4924 blocked for more than 462 seconds. r5:854c3c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1e80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa97000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549d38c r4:8549d000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549d38c r4:853b7680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c3c00 r8:853b76ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853b7680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b7680 r8:8027ed34 r7:eb4d9e60 r6:853bb980 r5:854c3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f1fb0 to 0xeb4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853c1bc0 INFO: task kworker/0:520:4924 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a8dde000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0771fb0 to 0xe0771ff8) INFO: task kworker/0:521:4926 blocked for more than 463 seconds. r5:854c3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6040 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r5:8501338c r4:85013000 r4:00000001 r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eb501d84 r8:00000002 r7:60000113 r6:eb501d8c r5:854c2400 r4:854c2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0487000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549db8c r4:8549d800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549db8c r4:853b7780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c2400 r8:853b77ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853b7780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b7780 r8:8027ed34 r7:eb4f9e60 r6:853bba80 r5:854c2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb501fb0 to 0xeb501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853c1fc0 INFO: task kworker/0:522:4928 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:854c4800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:854c4800 r8:853b78ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d60: 80070013 ffffffff r4:e0771dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/0:524:4933 blocked for more than 463 seconds. r5:854c5400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f62c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549e78c r4:8549e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549e78c r4:853b7800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c5400 r8:853b782c r7:82804d40 r6:dddced40 r5:dddced60 r4:853b7800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b7800 r8:8027ed34 r7:eb4f9e60 r6:853bbb80 r5:854c5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb515fb0 to 0xeb515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854f6080 INFO: task kworker/0:524:4933 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: a97a4000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:854c6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:8549eb8c r4:853b7900 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb521d84 r8:00000002 r7:60000113 r6:eb521d8c r5:854ba400 r4:854ba400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ba400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb521e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6c40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a038c r4:854a0000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a038c r4:853b7980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ba400 r8:853b79ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853b7980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b7980 r8:8027ed34 r7:eb51de60 r6:853bbc80 r5:854ba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/0:527:4938 blocked for more than 463 seconds. r5:84818000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eac3d000 r10:61c88647 r9:84818000 r8:853b7a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:854f6280 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8481a400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:853b7a80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d20: aa6c6000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:4943 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:4943 tgid:4943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb539d84 r8:00000002 r7:60000113 r6:eb539d8c r5:84818c00 r4:84818c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84818c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb539e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6880 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84818c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549f78c r4:8549f400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549f78c r4:853b7b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84818c00 r8:853b7b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853b7b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b7b00 r8:8027ed34 r7:eb521e60 r6:853bbe00 r5:84818c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854f6500 INFO: task kworker/0:529:4943 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: aa6c6000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:4945 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:4945 tgid:4945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb541d84 r8:00000002 r7:60000013 r6:eb541d8c r5:84819800 r4:84819800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84819800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6980 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84819800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549fb8c r4:8549f800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549fb8c r4:853b7b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84819800 r8:853b7bac r7:82804d40 r6:dddced40 r5:dddced60 r4:853b7b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b7b80 r8:8027ed34 r7:eb521e60 r6:853bbe80 r5:84819800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb541fb0 to 0xeb541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854f6680 INFO: task kworker/0:530:4945 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: aab88000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:4946 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:4946 tgid:4946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb511d84 r8:00000002 r7:60000013 r6:eb511d8c r5:85462400 r4:85462400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85462400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6ac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85462400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf23000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549ff8c r4:8549fc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8549ff8c r4:853b7c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85462400 r8:853b7c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853b7c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b7c00 r8:8027ed34 r7:eb521e60 r6:853b7c80 r5:85462400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb511fb0 to 0xeb511ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854f6780 INFO: task kworker/0:531:4946 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: aad42000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:4949 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:4949 tgid:4949 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb53dd84 r8:00000002 r7:60000113 r6:eb53dd8c r5:854c6000 r4:854c6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb53de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a0b8c r4:854a0800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a0b8c r4:853b7d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c6000 r8:853b7d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853b7d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b7d00 r8:8027ed34 r7:eb521e60 r6:853b7d80 r5:854c6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb53dfb0 to 0xeb53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854f6a40 INFO: task kworker/0:532:4949 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: aad42000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:4950 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb4c1d84 r8:00000002 r7:60000113 r6:eb4c1d8c r5:848a0000 r4:848a0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f6d40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf71000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a078c r4:854a0400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a078c r4:853b7e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a0000 r8:853b7e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853b7e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b7e00 r8:8027ed34 r7:eb53de60 r6:853b7e80 r5:848a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854f6a40 INFO: task kworker/0:533:4950 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ab1b2000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:534:4954 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:534 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb549d84 r8:00000002 r7:60000113 r6:eb549d8c r5:848a0c00 r4:848a0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb025000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a138c r4:854a1000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a138c r4:853b7f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a0c00 r8:853b7f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:853b7f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853b7f00 r8:8027ed34 r7:eb53de60 r6:853b7f80 r5:848a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb549fb0 to 0xeb549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854f6dc0 INFO: task kworker/0:534:4954 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ab1b2000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:4955 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:4955 tgid:4955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb54dd84 r8:00000002 r7:60000013 r6:eb54dd8c r5:848a1800 r4:848a1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb54de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853c1680 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a0f8c r4:854a0c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a0f8c r4:8550c000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a1800 r8:8550c02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550c000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550c000 r8:8027ed34 r7:eb549e60 r6:8550c080 r5:848a1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb54dfb0 to 0xeb54dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854f6dc0 INFO: task kworker/0:535:4955 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ab861000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847da880 r4:00000001 Exception stack(0xe0771fb0 to 0xe0771ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:536 state:D stack:0 pid:4958 tgid:4958 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:848a2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb05b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a178c r4:854a1400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a178c r4:8550c100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a2400 r8:8550c12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550c100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550c100 r8:8027ed34 r7:eb549e60 r6:8550c180 r5:848a2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550b1c0 INFO: task kworker/0:536:4958 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ab861000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r5:848a3000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb275000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a1f8c r4:854a1c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a1f8c r4:8550c200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a3000 r8:8550c22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550c200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550c200 r8:8027ed34 r7:eb551e60 r6:8550c280 r5:848a3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb55dfb0 to 0xeb55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550b100 INFO: task kworker/0:537:4960 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: abd8b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:4961 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:848a3c00 r5:848a3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb095000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a1b8c r4:854a1800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a1b8c r4:8550c300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a3c00 r8:8550c32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550c300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550c300 r8:8027ed34 r7:eb55de60 r6:8550c380 r5:848a3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb555fb0 to 0xeb555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550b100 INFO: task kworker/0:538:4961 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80070013 ffffffff r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:848a4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a278c r4:854a2400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a278c r4:8550c400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a4800 r8:8550c42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550c400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550c400 r8:8027ed34 r7:eb55de60 r6:8550c480 r5:848a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb561fb0 to 0xeb561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550b4c0 INFO: task kworker/0:539:4964 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: abd8b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:82ac11e4 r4:e0771dc0 r4:00000000 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:540:4965 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:540 state:D stack:0 pid:4965 tgid:4965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb565d84 r8:00000002 r7:60000113 r6:eb565d8c r5:848a5400 r4:848a5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb565e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb291000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a238c r4:854a2000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a238c r4:8550c500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a5400 r8:8550c52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550c500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:540:4965 is blocked on a mutex likely owned by task kworker/1:227:3838. r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 1d60: 80070013 ffffffff r4:82ac11e4 r4:e0771dc0 r4:00000000 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:8501338c r4:85013000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0771fb0 to 0xe0771ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb569d84 r8:00000002 r7:60000013 r6:eb569d8c r5:848a6000 r4:848a6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550ba40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a2b8c r4:854a2800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a2b8c r4:8550c600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a6000 r8:8550c62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550c600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550c600 r8:8027ed34 r7:eb561e60 r6:8550c680 r5:848a6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb569fb0 to 0xeb569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550b780 INFO: task kworker/0:541:4969 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ac3dd000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:542:4970 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:542 state:D stack:0 pid:4970 tgid:4970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb571d84 r8:00000002 r7:60000013 r6:eb571d8c r5:848a6c00 r4:848a6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848a6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550bb80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a2f8c r4:854a2c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a2f8c r4:8550c700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848a6c00 r8:8550c72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550c700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550c700 r8:8027ed34 r7:eb569e60 r6:8550c780 r5:848a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb571fb0 to 0xeb571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550ba00 INFO: task kworker/0:542:4970 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ac3dd000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:543:4971 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:543 state:D stack:0 pid:4971 tgid:4971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb575d84 r8:00000002 r7:60000113 r6:eb575d8c r5:85528000 r4:85528000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85528000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550bd00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85528000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb357000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a338c r4:854a3000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a338c r4:8550c800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85528000 r8:8550c82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550c800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550c800 r8:8027ed34 r7:eb571e60 r6:8550c880 r5:85528000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb575fb0 to 0xeb575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550ba00 INFO: task kworker/0:543:4971 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ac994000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:544:4973 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:544 state:D stack:0 pid:4973 tgid:4973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb56dd84 r8:00000002 r7:60000113 r6:eb56dd8c r5:85528c00 r4:85528c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85528c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb56de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0cd00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85528c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3af000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a3b8c r4:854a3800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a3b8c r4:8550c900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85528c00 r8:8550c92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550c900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550c900 r8:8027ed34 r7:eb575e60 r6:8550c980 r5:85528c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb56dfb0 to 0xeb56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550bb00 INFO: task kworker/0:544:4973 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: acc82000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85529800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550bec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85529800 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb379000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a378c r4:854a3400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a378c r4:8550ca00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85529800 r8:8550ca2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550ca00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550ca00 r8:8027ed34 r7:eb56de60 r6:8550ca80 r5:85529800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb579fb0 to 0xeb579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550bd40 INFO: task kworker/0:545:4975 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ad0f7000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:4977 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:4977 tgid:4977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb57dd84 r8:00000002 r7:60000013 r6:eb57dd8c r5:8552a400 r4:8552a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8552a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85523040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8552a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ff000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a3f8c r4:854a3c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:854a3f8c r4:8550cb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8552a400 r8:8550cb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550cb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550cb00 r8:8027ed34 r7:eb56de60 r6:8550cb80 r5:8552a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb57dfb0 to 0xeb57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8550be40 INFO: task kworker/0:546:4977 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ad0f7000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:547:4979 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:547 state:D stack:0 pid:4979 tgid:4979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb581d84 r8:00000002 r7:60000113 r6:eb581d8c r5:8552b000 r4:8552b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8552b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85523480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8552b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb433000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559c78c r4:8559c400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8559c78c r4:8550cc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8552b000 r8:8550cc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550cc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550cc00 r8:8027ed34 r7:eb57de60 r6:8550cc80 r5:8552b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb581fb0 to 0xeb581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85523080 INFO: task kworker/0:547:4979 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ad0f7000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:4981 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb585d84 r8:00000002 r7:60000113 r6:eb585d8c r5:8552bc00 r4:8552bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8552bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb585e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85523300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8552bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb413000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559c38c r4:8559c000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8559c38c r4:8550cd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8552bc00 r8:8550cd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550cd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550cd00 r8:8027ed34 r7:eb581e60 r6:8550cd80 r5:8552bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb585fb0 to 0xeb585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85523180 INFO: task kworker/0:548:4981 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ad556000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:4983 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:4983 tgid:4983 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb589d84 r8:00000002 r7:60000013 r6:eb589d8c r5:8552c800 r4:8552c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8552c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85523800 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8552c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559cf8c r4:8559cc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8559cf8c r4:8550ce00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8552c800 r8:8550ce2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550ce00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550ce00 r8:8027ed34 r7:eb581e60 r6:8550ce80 r5:8552c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb589fb0 to 0xeb589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855232c0 INFO: task kworker/0:549:4983 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ad556000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:550:4984 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:550 state:D stack:0 pid:4984 tgid:4984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb595d84 r8:00000002 r7:60000113 r6:eb595d8c r5:8552d400 r4:8552d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8552d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85523740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8552d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb597000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559cb8c r4:8559c800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8559cb8c r4:8550cf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8552d400 r8:8550cf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8550cf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8550cf00 r8:8027ed34 r7:eb589e60 r6:8550cf80 r5:8552d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855232c0 INFO: task kworker/0:550:4984 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: adec3000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:4987 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:4987 tgid:4987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb591d84 r8:00000002 r7:60000113 r6:eb591d8c r5:8552e000 r4:8552e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8552e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb591e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85560000 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r4:847da880 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:8497f8c0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8552ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5ade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85523940 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8552ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5af000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559d38c r4:8559d000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8559d38c r4:85560100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8552ec00 r8:8556012c r7:82804d40 r6:dddced40 r5:dddced60 r4:85560100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85560100 r8:8027ed34 r7:eb591e60 r6:85560180 r5:8552ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5adfb0 to 0xeb5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85523880 INFO: task kworker/0:552:4988 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: adec3000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84810000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85523c40 r5:00001000 r4:eb5c7000 r5:8559db8c r4:8559d800 r7:dddced40 r6:83018000 r5:8559db8c r4:85560200 r4:85560200 r4:00000001 Exception stack(0xeb5b9fb0 to 0xeb5b9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85523980 INFO: task kworker/0:553:4991 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: adec3000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:554:4993 blocked for more than 463 seconds. Workqueue: events bpf_prog_free_deferred [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84810c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85523fc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84810c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5df000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559e38c r4:8559e000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8559e38c r4:85560380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84810c00 r8:855603ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85560380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85560380 r8:8027ed34 r7:eb5b9e60 r6:85560400 r5:84810c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c5fb0 to 0xeb5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85523d80 INFO: task kworker/0:554:4993 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) r5:80070013 r4:80239bd0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 r5:8501338c r4:85013000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84812400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85523f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84812400 r7:00000000 r6:83018000 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa35000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559e78c r4:8559e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8559e78c r4:85560500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84812400 r8:8556052c r7:82804d40 r6:dddced40 r5:dddced60 r4:85560500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85560500 r8:8027ed34 r7:eb5c5e60 r6:85560580 r5:84812400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:854eee40 INFO: task kworker/0:556:4997 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ae31c000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 r4:00000000 r5:8501338c r4:85013000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb46dd84 r8:00000002 r7:60000113 r6:eb46dd8c r5:84813000 r5:84813000 r4:829187f0 r4:00000000 r9:83018005 r8:84813000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 r10:00000000 r9:85560600 r8:8027ed34 r7:eb5d1e60 r6:85560680 r5:84813000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:558:5001 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:558 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5e9d84 r8:00000002 r7:60000013 r6:eb5e9d8c r5:84813c00 r4:84813c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84813c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85570100 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84813c00 r7:00000000 r6:83018000 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb07000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8559eb8c r4:8559e800 r10:61c88647 r9:84813c00 r8:8556072c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0771dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:559:5003 blocked for more than 463 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5f1d84 r8:00000002 r7:60000013 r6:eb5f1d8c r5:84814800 r4:84814800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84814800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85570280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84814800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffa1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559ef8c r4:8559ec00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8559ef8c r4:85560800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84814800 r8:8556082c r7:82804d40 r6:dddced40 r5:dddced60 r4:85560800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85560800 r8:8027ed34 r7:eb46de60 r6:85560880 r5:84814800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85570080 INFO: task kworker/0:559:5003 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: aee17000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eb5ddd84 r8:00000002 r7:60000013 r6:eb5ddd8c r5:84815400 r5:84815400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855708c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84815400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4849000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8559fb8c r4:8559f800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8559fb8c r4:85560900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84815400 r8:8556092c r7:82804d40 r6:dddced40 r5:dddced60 r4:85560900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85560900 r8:8027ed34 r7:eb46de60 r6:85560980 r5:84815400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5ddfb0 to 0xeb5ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85570080 INFO: task kworker/0:560:5004 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: aee17000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:561:5007 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84816c00 r8:85560a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85560a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85560a00 r8:8027ed34 r7:eb5dde60 r6:85560a80 r5:84816c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f9fb0 to 0xeb5f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855704c0 INFO: task kworker/0:561:5007 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: af328000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85540000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:8559ff8c r4:8559fc00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 r4:85541800 r5:85541800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb605e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:564:5013 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:5013 tgid:5013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb609d84 r8:00000002 r7:60000013 r6:eb609d8c r5:85542400 r4:85542400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85542400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85570e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85542400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead03000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a838c r4:855a8000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855a838c r4:85560d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85542400 r8:85560d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85560d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85560d00 r8:8027ed34 r7:eb605e60 r6:85560d80 r5:85542400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85570940 Workqueue: events bpf_prog_free_deferred 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85570f40 r7:dddced40 r6:83018000 r5:855a878c r4:85560e00 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:5019 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:5019 tgid:5019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb611d84 r8:00000002 r7:60000113 r6:eb611d8c r5:85543c00 r4:85543c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85543c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557a4c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85543c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a938c r4:855a9000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb611fb0 to 0xeb611ff8) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:e0771dc0 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:61c88647 r9:85544800 r8:8557702c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b04f8000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85545400 r4:829187f0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:855a978c r4:85577100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) Workqueue: events bpf_prog_free_deferred r5:8501338c r4:85013000 task:kworker/0:570 state:D stack:0 pid:5026 tgid:5026 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85546c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557a800 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85546c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855a9f8c r4:855a9c00 r10:00000000 r9:85577300 r8:8027ed34 r7:eb615e60 r6:85577380 r5:85546c00 r4:00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85540c00 r4:829187f0 r9:83018005 r8:85540c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:00000000 r7:dddced40 r6:83018000 r5:855aa38c r4:85577500 1d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:84928000 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557aec0 1d60: 80070013 ffffffff r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r10:829187f4 r9:eb635d84 r8:00000002 r7:60000013 r6:eb635d8c r5:84928c00 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb115000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855aab8c r4:855aa800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855aab8c r4:85577700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84928c00 r8:8557772c r7:82804d40 r6:dddced40 r5:dddced60 r4:85577700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85577700 r8:8027ed34 r7:eb629e60 r6:85577780 r5:84928c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb635fb0 to 0xeb635ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 task:kworker/0:575 state:D stack:0 pid:5036 tgid:5036 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:dddced40 r6:83018000 r5:855ab78c r4:85577800 1d60: 80070013 ffffffff r5:8501338c r4:85013000 Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:5038 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:5038 tgid:5038 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb631d84 r8:00000002 r7:60000113 r6:eb631d8c r5:8492b000 r4:8492b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb631e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557ad40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492b000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb151000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ab38c r4:855ab000 r4:00000001 Exception stack(0xe0771d20 to 0xe0771d68) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r10:829187f4 r9:eb63dd84 r8:00000002 r7:60000113 r6:eb63dd8c r5:8492bc00 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855abb8c r4:855ab800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855abb8c r4:85577b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492c800 r8:85577b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85577b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85577b00 r8:8027ed34 r7:eb63de60 r6:85577b80 r5:8492c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb641fb0 to 0xeb641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8558e180 INFO: task kworker/0:578:5042 is blocked on a mutex likely owned by task kworker/1:227:3838. Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r4:e0771dc0 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb645d84 r8:00000002 r7:60000013 r6:eb645d8c r5:8492d400 r5:8492d400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:855b478c r4:85577c00 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r5:00001000 r4:dfa99000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:580:5045 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:580 state:D stack:0 pid:5045 tgid:5045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb64dd84 r8:00000002 r7:60000113 r6:eb64dd8c r5:8492e000 r4:8492e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb64de08 r4:00000000 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85577d00 r8:8027ed34 r7:eb645e60 r6:85577d80 r5:8492e000 Exception stack(0xeb64dfb0 to 0xeb64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8558e340 INFO: task kworker/0:580:5045 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b2e77000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:581 state:D stack:0 pid:5048 tgid:5048 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8481e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb659e08 r5:00001000 r4:eb269000 r7:dddced40 r6:83018000 r5:855b4b8c r4:85577e00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0771d20 to 0xe0771d68) r4:82ac11e4 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:582 state:D stack:0 pid:5051 tgid:5051 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8481b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb665e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558ec40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8481b000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb483000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b538c r4:855b5000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b538c r4:85577e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481b000 r8:85577eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85577e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85577e80 r8:8027ed34 r7:eb659e60 r6:853bbf80 r5:8481b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb665fb0 to 0xeb665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8558e980 INFO: task kworker/0:582:5051 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b347f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8481ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:85577f00 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:5054 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb671d84 r8:00000002 r7:60000113 r6:eb671d8c r5:8481bc00 r4:8481bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8481bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0580 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8481c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:855b5b8c r4:85598000 Exception stack(0xeb675fb0 to 0xeb675ff8) task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb691d84 r8:00000002 r7:60000113 r6:eb691d8c r5:85548000 r5:85548000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb691e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558ed00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85548000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb683000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b5f8c r4:855b5c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b5f8c r4:85598080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85548000 r8:855980ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85598080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85598080 r8:8027ed34 r7:eb671e60 r6:855dc180 r5:85548000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb691fb0 to 0xeb691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8558ef80 INFO: task kworker/0:586:5059 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b3fb9000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 r5:8554b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb6a1fb0 to 0xeb6a1ff8) task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0771dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85548c00 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0040 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b9fb0 to 0xeb6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e01c0 INFO: task kworker/0:588:5063 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b42ec000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 r5:8554a400 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0280 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0771dc0 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85549800 r5:85549800 r4:829187f0 r9:83018005 r8:85549800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 r10:00000000 r9:85598280 r8:8027ed34 r7:eb671e60 r6:855dc380 r5:85549800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6cdfb0 to 0xeb6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e0340 INFO: task kworker/0:590:5066 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b49bb000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:591 state:D stack:0 pid:5069 tgid:5069 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8554c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:8554c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b778c r4:855b7400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b778c r4:85598300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8554c800 r8:8559832c r7:82804d40 r6:dddced40 r5:dddced60 r4:85598300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85598300 r8:8027ed34 r7:eb671e60 r6:855dc400 r5:8554c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e1fb0 to 0xeb6e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e0380 INFO: task kworker/0:591:5069 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b4b4a000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:82ac11e4 r4:e0771dc0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:592:5071 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:592 state:D stack:0 pid:5071 tgid:5071 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0771dc0 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:8554ec00 r8:8559842c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b4df4000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:594:5075 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:5075 tgid:5075 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb711d84 r8:00000002 r7:60000113 r6:eb711d8c r5:8554bc00 r4:8554bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8554bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb711e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0940 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8554bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb703000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b7f8c r4:855b7c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b7f8c r4:85598480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8554bc00 r8:855984ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85598480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85598480 r8:8027ed34 r7:eb6f1e60 r6:855dc580 r5:8554bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb711fb0 to 0xeb711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e0640 INFO: task kworker/0:594:5075 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b51c8000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:595:5077 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:595 state:D stack:0 pid:5077 tgid:5077 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb721d84 r8:00000002 r7:60000113 r6:eb721d8c r5:854c8000 r4:854c8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb721e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb713000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b838c r4:855b8000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b838c r4:85598500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c8000 r8:8559852c r7:82804d40 r6:dddced40 r5:dddced60 r4:85598500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85598500 r8:8027ed34 r7:eb6f1e60 r6:855dc600 r5:854c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb721fb0 to 0xeb721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e0740 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:596:5078 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:596 state:D stack:0 pid:5078 tgid:5078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb725d84 r8:00000002 r7:60000113 r6:eb725d8c r5:854c8c00 r4:854c8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb725e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0bc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb727000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b878c r4:855b8400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b878c r4:85598580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c8c00 r8:855985ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85598580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85598580 r8:8027ed34 r7:eb6f1e60 r6:855dc680 r5:854c8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb725fb0 to 0xeb725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e0900 INFO: task kworker/0:596:5078 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) Exception stack(0xe0771d20 to 0xe0771d68) 1d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:00000000 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:8501338c r4:85013000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:5080 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:5080 tgid:5080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb649d84 r8:00000002 r7:60000113 r6:eb649d8c r5:8492ec00 r4:8492ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8492ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb649e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0d00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8492ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b8b8c r4:855b8800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b8b8c r4:85598600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8492ec00 r8:8559862c r7:82804d40 r6:dddced40 r5:dddced60 r4:85598600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85598600 r8:8027ed34 r7:eb6f1e60 r6:85598680 r5:8492ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb649fb0 to 0xeb649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e0a00 INFO: task kworker/0:597:5080 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b5806000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:598:5084 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:598 state:D stack:0 pid:5084 tgid:5084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb519d84 r8:00000002 r7:60000113 r6:eb519d8c r5:84929800 r4:84929800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84929800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e0f80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84929800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0533000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b938c r4:855b9000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b938c r4:85598700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84929800 r8:8559872c r7:82804d40 r6:dddced40 r5:dddced60 r4:85598700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85598700 r8:8027ed34 r7:eb6f1e60 r6:85598780 r5:84929800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb519fb0 to 0xeb519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855e0cc0 INFO: task kworker/0:598:5084 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b5806000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:5085 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:599 state:D stack:0 pid:5085 tgid:5085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb559d84 r8:00000002 r7:60000013 r6:eb559d8c r5:84838000 r4:84838000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84838000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a0cc40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84838000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9cd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b978c r4:855b9400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b978c r4:85598800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84838000 r8:8559882c r7:82804d40 r6:dddced40 r5:dddced60 r4:85598800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85598800 r8:8027ed34 r7:eb519e60 r6:85598880 r5:84838000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb559fb0 to 0xeb559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b610f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:5088 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:5088 tgid:5088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb59dd84 r8:00000002 r7:60000013 r6:eb59dd8c r5:84838c00 r4:84838c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84838c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84838c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac8d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84838c00 r8:8559892c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 r4:8497f8c0 Not tainted 6.15.0-syzkaller #0 r10:829187f4 r9:eb651d84 r8:00000002 r7:60000013 r6:eb651d8c r5:84839800 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b1040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84839800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b9b8c r4:855b9800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b9b8c r4:85598a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84839800 r8:85598a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85598a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85598a00 r8:8027ed34 r7:eb59de60 r6:85598a80 r5:84839800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb651fb0 to 0xeb651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb000 INFO: task kworker/0:601:5089 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b610f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:602:5092 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:602 state:D stack:0 pid:5092 tgid:5092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5a9d84 r8:00000002 r7:60000113 r6:eb5a9d8c r5:8483a400 r4:8483a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8483a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb0c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8483a400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 r5:00001000 r4:eabe5000 r10:61c88647 r9:8483a400 r8:85598b2c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:00000000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:603:5093 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:603 state:D stack:0 pid:5093 tgid:5093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5c1d84 r8:00000002 r7:60000013 r6:eb5c1d8c r5:8483b000 r5:8483b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8483b000 r8:85598c2c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb200 INFO: task kworker/0:603:5093 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b66f7000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:5095 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:5095 tgid:5095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5cdd84 r8:00000002 r7:60000013 r6:eb5cdd8c r5:8483bc00 r4:8483bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8483bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8483bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8483bc00 r8:85598d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb400 INFO: task kworker/0:604:5095 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b6e9d000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:605:5097 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:5097 tgid:5097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5d9d84 r8:00000002 r7:60000113 r6:eb5d9d8c r5:8483c800 r4:8483c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8483c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fb840 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8483c800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855baf8c r4:855bac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855baf8c r4:85598e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483c800 r8:85598e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85598e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85598e00 r8:8027ed34 r7:eb5cde60 r6:85598e80 r5:8483c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb740 INFO: task kworker/0:605:5097 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b7114000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0771dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r5:00001000 r4:dfa99000 r5:8501338c r4:85013000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:5099 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:5099 tgid:5099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb5e5d84 r8:00000002 r7:60000013 r6:eb5e5d8c r5:8483d400 r4:8483d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8483d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fba00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8483d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf85000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855bb38c r4:855bb000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855bb38c r4:85598f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483d400 r8:85598f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85598f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85598f00 r8:8027ed34 r7:eb5d9e60 r6:85598f80 r5:8483d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e5fb0 to 0xeb5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb5c0 INFO: task kworker/0:606:5099 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b7114000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:607:5101 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:607 state:D stack:0 pid:5101 tgid:5101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb731d84 r8:00000002 r7:60000113 r6:eb731d8c r5:8483e000 r4:8483e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8483e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb731e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fbb80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8483e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855bb78c r4:855bb400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855bb78c r4:8560d000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8483e000 r8:8560d02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8560d000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560d000 r8:8027ed34 r7:eb5e5e60 r6:8560d080 r5:8483e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb731fb0 to 0xeb731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fb880 INFO: task kworker/0:607:5101 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8497f8c0 Not tainted 6.15.0-syzkaller #0 r4:8483ec00 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb735e08 r5:00001000 r4:eb011000 r10:61c88647 r9:8483ec00 r8:8560d12c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: b769c000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85658000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:85658000 r8:8560d22c r7:82804d40 r6:dddced40 r5:dddced60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fbb40 INFO: task kworker/0:609:5105 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b8065000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:610:5107 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:610 state:D stack:0 pid:5107 tgid:5107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb73dd84 r8:00000002 r7:60000113 r6:eb73dd8c r5:85658c00 r4:85658c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85658c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb73de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616400 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85658c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2bb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:855c8b8c r4:8560d300 r4:8560d300 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b8065000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 r7:dddced40 r6:83018000 r5:855c838c r4:8560d400 r10:61c88647 r9:8565a400 r8:8560d42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8560d400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560d400 r8:8027ed34 r7:eb73de60 r6:8560d480 r5:8565a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855fbe80 INFO: task kworker/0:611:5109 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b86bc000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:855c878c r4:8560d500 Exception stack(0xeb749fb0 to 0xeb749ff8) Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:8501338c r4:85013000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 r4:854ca400 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:8560d600 r8:8027ed34 r7:eb73de60 r6:855dc700 r5:854ca400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85616280 INFO: task kworker/0:613:5113 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b86bc000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:614:5115 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:614 state:D stack:0 pid:5115 tgid:5115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb759d84 r8:00000002 r7:60000113 r6:eb759d8c r5:854c9800 r4:854c9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854c9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb759e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ca78c r4:855ca400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ca78c r4:8560d700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854c9800 r8:8560d72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8560d700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560d700 r8:8027ed34 r7:eb751e60 r6:855dc780 r5:854c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb759fb0 to 0xeb759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85616600 INFO: task kworker/0:614:5115 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b8ef1000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:615:5116 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:615 state:D stack:0 pid:5116 tgid:5116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb75dd84 r8:00000002 r7:60000013 r6:eb75dd8c r5:854cc800 r4:854cc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cc800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb75de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616600 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2fd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c938c r4:855c9000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855c938c r4:8560d680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cc800 r8:8560d6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8560d680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560d680 r8:8027ed34 r7:eb759e60 r6:855dc800 r5:854cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb75dfb0 to 0xeb75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85616540 INFO: task kworker/0:615:5116 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b9676000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:5118 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:5118 tgid:5118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb765d84 r8:00000002 r7:60000113 r6:eb765d8c r5:854cbc00 r4:854cbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb765e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616780 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb385000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c978c r4:855c9400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855c978c r4:8560d780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cbc00 r8:8560d7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8560d780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560d780 r8:8027ed34 r7:eb759e60 r6:855dc880 r5:854cbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb765fb0 to 0xeb765ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856166c0 INFO: task kworker/0:616:5118 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b9676000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:617:5120 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:617 state:D stack:0 pid:5120 tgid:5120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb76dd84 r8:00000002 r7:60000113 r6:eb76dd8c r5:854cec00 r4:854cec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb76de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c9b8c r4:855c9800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855c9b8c r4:8560d800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cec00 r8:8560d82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8560d800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560d800 r8:8027ed34 r7:eb759e60 r6:855dc900 r5:854cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb76dfb0 to 0xeb76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85616580 INFO: task kworker/0:617:5120 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: b9831000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:618:5122 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:618 state:D stack:0 pid:5122 tgid:5122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb775d84 r8:00000002 r7:60000113 r6:eb775d8c r5:854cb000 r4:854cb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cb000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb775e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616a40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb409000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855c9f8c r4:855c9c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855c9f8c r4:8560d880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cb000 r8:8560d8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8560d880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560d880 r8:8027ed34 r7:eb759e60 r6:855dc980 r5:854cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb775fb0 to 0xeb775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856167c0 INFO: task kworker/0:618:5122 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ba0ce000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:5124 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:5124 tgid:5124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb77dd84 r8:00000002 r7:60000013 r6:eb77dd8c r5:854cd400 r4:854cd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854cd400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb77de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616bc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb435000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ca38c r4:855ca000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ca38c r4:8560d900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854cd400 r8:8560d92c r7:82804d40 r6:dddced40 r5:dddced60 r4:8560d900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560d900 r8:8027ed34 r7:eb759e60 r6:855dca00 r5:854cd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb77dfb0 to 0xeb77dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856168c0 INFO: task kworker/0:619:5124 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ba0ce000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:620:5127 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:620 state:D stack:0 pid:5127 tgid:5127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb789d84 r8:00000002 r7:60000113 r6:eb789d8c r5:854ce000 r4:854ce000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854ce000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb789e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562d040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb52d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cb38c r4:855cb000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cb38c r4:8560d980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854ce000 r8:8560d9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8560d980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560d980 r8:8027ed34 r7:eb759e60 r6:855dca80 r5:854ce000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb789fb0 to 0xeb789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85616c00 INFO: task kworker/0:620:5127 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ba905000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:621:5129 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:621 state:D stack:0 pid:5129 tgid:5129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb791d84 r8:00000002 r7:60000113 r6:eb791d8c r5:854d0c00 r4:854d0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616e00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cab8c r4:855ca800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cab8c r4:8560da00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d0c00 r8:8560da2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8560da00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560da00 r8:8027ed34 r7:eb789e60 r6:855dcb00 r5:854d0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb791fb0 to 0xeb791ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85616a80 INFO: task kworker/0:621:5129 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bad4f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:622:5130 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:622 state:D stack:0 pid:5130 tgid:5130 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb505000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855caf8c r4:855cac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855caf8c r4:8560da80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565bc00 r8:8560daac r7:82804d40 r6:dddced40 r5:dddced60 r4:8560da80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560da80 r8:8027ed34 r7:eb789e60 r6:8560db00 r5:8565bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb741fb0 to 0xeb741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85616e40 INFO: task kworker/0:622:5130 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bad4f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:623:5133 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:623 state:D stack:0 pid:5133 tgid:5133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb795d84 r8:00000002 r7:60000113 r6:eb795d8c r5:8565c800 r4:8565c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8565c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562d300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8565c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb545000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cb78c r4:855cb400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cb78c r4:8560db80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565c800 r8:8560dbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8560db80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560db80 r8:8027ed34 r7:eb789e60 r6:8560dc00 r5:8565c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb795fb0 to 0xeb795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bad4f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:624:5135 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:624 state:D stack:0 pid:5135 tgid:5135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb799d84 r8:00000002 r7:60000113 r6:eb799d8c r5:8565d400 r4:8565d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8565d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb799e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562d480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8565d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cbb8c r4:855cb800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cbb8c r4:8560dc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565d400 r8:8560dcac r7:82804d40 r6:dddced40 r5:dddced60 r4:8560dc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560dc80 r8:8027ed34 r7:eb795e60 r6:8560dd00 r5:8565d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb799fb0 to 0xeb799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562d180 INFO: task kworker/0:624:5135 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bb36f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:625:5138 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:625 state:D stack:0 pid:5138 tgid:5138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb74dd84 r8:00000002 r7:60000113 r6:eb74dd8c r5:8565ec00 r4:8565ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8565ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb74de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562d5c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8565ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cbf8c r4:855cbc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cbf8c r4:8560dd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565ec00 r8:8560ddac r7:82804d40 r6:dddced40 r5:dddced60 r4:8560dd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560dd80 r8:8027ed34 r7:eb799e60 r6:8560de00 r5:8565ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb74dfb0 to 0xeb74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562d440 INFO: task kworker/0:625:5138 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bb7c1000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:626:5139 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:626 state:D stack:0 pid:5139 tgid:5139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7a9d84 r8:00000002 r7:60000113 r6:eb7a9d8c r5:854d1800 r4:854d1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562d800 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7ab000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cc38c r4:855cc000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cc38c r4:8560de80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d1800 r8:8560deac r7:82804d40 r6:dddced40 r5:dddced60 r4:8560de80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560de80 r8:8027ed34 r7:eb74de60 r6:855dcb80 r5:854d1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a9fb0 to 0xeb7a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562d440 INFO: task kworker/0:626:5139 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bbd6d000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:627:5142 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:627 state:D stack:0 pid:5142 tgid:5142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7c5d84 r8:00000002 r7:60000013 r6:eb7c5d8c r5:854d3c00 r4:854d3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562d8c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cc78c r4:855cc400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cc78c r4:8560df00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d3c00 r8:8560df2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8560df00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560df00 r8:8027ed34 r7:eb7a9e60 r6:855dcc00 r5:854d3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c5fb0 to 0xeb7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562d680 INFO: task kworker/0:627:5142 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bc042000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:628:5143 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:628 state:D stack:0 pid:5143 tgid:5143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7d1d84 r8:00000002 r7:60000113 r6:eb7d1d8c r5:854d0000 r4:854d0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85627bc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cd38c r4:855cd000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cd38c r4:8560df80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d0000 r8:8560dfac r7:82804d40 r6:dddced40 r5:dddced60 r4:8560df80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8560df80 r8:8027ed34 r7:eb7c5e60 r6:855dcc80 r5:854d0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562d900 INFO: task kworker/0:628:5143 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bc042000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:629:5144 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:629 state:D stack:0 pid:5144 tgid:5144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7a1d84 r8:00000002 r7:60000113 r6:eb7a1d8c r5:8565e000 r4:8565e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8565e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562d9c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8565e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ccb8c r4:855cc800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ccb8c r4:85631000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565e000 r8:8563102c r7:82804d40 r6:dddced40 r5:dddced60 r4:85631000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85631000 r8:8027ed34 r7:eb7d1e60 r6:85631080 r5:8565e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a1fb0 to 0xeb7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562d900 INFO: task kworker/0:629:5144 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bca09000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:630:5147 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:630 state:D stack:0 pid:5147 tgid:5147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7c1d84 r8:00000002 r7:60000013 r6:eb7c1d8c r5:8565b000 r4:8565b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8565b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562db80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8565b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ccf8c r4:855ccc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ccf8c r4:85631100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565b000 r8:8563112c r7:82804d40 r6:dddced40 r5:dddced60 r4:85631100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85631100 r8:8027ed34 r7:eb7d1e60 r6:85631180 r5:8565b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c1fb0 to 0xeb7c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562dcc0 INFO: task kworker/0:630:5147 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bca09000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:631:5149 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:631 state:D stack:0 pid:5149 tgid:5149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7d5d84 r8:00000002 r7:60000113 r6:eb7d5d8c r5:85660000 r4:85660000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85660000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562de80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85660000 r7:00000000 r6:83018000 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa57000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cd78c r4:855cd400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cd78c r4:85631200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85660000 r8:8563122c r7:82804d40 r6:dddced40 r5:dddced60 r4:85631200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85631200 r8:8027ed34 r7:eb7d1e60 r6:85631280 r5:85660000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d5fb0 to 0xeb7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562db40 INFO: task kworker/0:631:5149 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bcc17000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:632:5155 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:632 state:D stack:0 pid:5155 tgid:5155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7edd84 r8:00000002 r7:60000113 r6:eb7edd8c r5:85660c00 r4:85660c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85660c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562dfc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85660c00 r7:00000000 r6:83018000 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb53000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cdb8c r4:855cd800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cdb8c r4:85631300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85660c00 r8:8563132c r7:82804d40 r6:dddced40 r5:dddced60 r4:85631300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85631300 r8:8027ed34 r7:eb7d5e60 r6:85631380 r5:85660c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7edfb0 to 0xeb7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562df80 INFO: task kworker/0:632:5155 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bcc17000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:633:5156 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:633 state:D stack:0 pid:5156 tgid:5156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb79dd84 r8:00000002 r7:60000113 r6:eb79dd8c r5:85661800 r4:85661800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85661800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb79de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85616d00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85661800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0043000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cdf8c r4:855cdc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cdf8c r4:85631400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85661800 r8:8563142c r7:82804d40 r6:dddced40 r5:dddced60 r4:85631400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85631400 r8:8027ed34 r7:eb7ede60 r6:85631480 r5:85661800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb79dfb0 to 0xeb79dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562df80 INFO: task kworker/0:633:5156 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bcc17000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:634:5157 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:634 state:D stack:0 pid:5157 tgid:5157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb689d84 r8:00000002 r7:60000113 r6:eb689d8c r5:85662400 r4:85662400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85662400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb689e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85615300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85662400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ce38c r4:855ce000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ce38c r4:85631500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85662400 r8:8563152c r7:82804d40 r6:dddced40 r5:dddced60 r4:85631500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85631500 r8:8027ed34 r7:eb79de60 r6:85631580 r5:85662400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb689fb0 to 0xeb689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85615d00 INFO: task kworker/0:634:5157 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bd033000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:635:5158 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:635 state:D stack:0 pid:5158 tgid:5158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb699d84 r8:00000002 r7:60000113 r6:eb699d8c r5:85663000 r4:85663000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85663000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85627e80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85663000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9ad000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cef8c r4:855cec00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cef8c r4:85631600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85663000 r8:8563162c r7:82804d40 r6:dddced40 r5:dddced60 r4:85631600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85631600 r8:8027ed34 r7:eb689e60 r6:85631680 r5:85663000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb699fb0 to 0xeb699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85615d00 INFO: task kworker/0:635:5158 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bd033000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:381:5161 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:5161 tgid:5161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:85663c00 r4:85663c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85663c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb69de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647500 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85663c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead49000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542538c r4:85425000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8542538c r4:855dcd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85663c00 r8:855dcd2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855dcd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855dcd00 r8:8027ed34 r7:eb3c5e60 r6:85631700 r5:85663c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb69dfb0 to 0xeb69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85647440 INFO: task kworker/1:381:5161 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bd5e8000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:5164 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:5164 tgid:5164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb68dd84 r8:00000002 r7:60000113 r6:eb68dd8c r5:85664800 r4:85664800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85664800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb68de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647b40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85664800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0cf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542678c r4:85426400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8542678c r4:855dcd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85664800 r8:855dcdac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855dcd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855dcd80 r8:8027ed34 r7:eb3c5e60 r6:85631780 r5:85664800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb68dfb0 to 0xeb68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85647440 INFO: task kworker/1:382:5164 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: be577000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:5165 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:383 state:D stack:0 pid:5165 tgid:5165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6a9d84 r8:00000002 r7:60000113 r6:eb6a9d8c r5:85665400 r4:85665400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85665400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647800 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85665400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85425b8c r4:85425800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85425b8c r4:855dce00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85665400 r8:855dce2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855dce00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855dce00 r8:8027ed34 r7:eb68de60 r6:85631800 r5:85665400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85647440 INFO: task kworker/1:383:5165 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: be577000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:636:5166 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:636 state:D stack:0 pid:5166 tgid:5166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6add84 r8:00000002 r7:60000113 r6:eb6add8c r5:85666000 r4:85666000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85666000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85627d40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85666000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ceb8c r4:855ce800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855ceb8c r4:85631880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85666000 r8:856318ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85631880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85631880 r8:8027ed34 r7:eb699e60 r6:85631900 r5:85666000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6adfb0 to 0xeb6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856462c0 INFO: task kworker/0:636:5166 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: be793000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:5168 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:5168 tgid:5168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6b5d84 r8:00000002 r7:60000113 r6:eb6b5d8c r5:85666c00 r4:85666c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85666c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85666c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae37000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85425f8c r4:85425c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85425f8c r4:855dce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85666c00 r8:855dceac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855dce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855dce80 r8:8027ed34 r7:eb68de60 r6:85631980 r5:85666c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b5fb0 to 0xeb6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85647340 INFO: task kworker/1:384:5168 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: beb5e000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:385:5170 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:385 state:D stack:0 pid:5170 tgid:5170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6bdd84 r8:00000002 r7:60000013 r6:eb6bdd8c r5:84820000 r4:84820000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84820000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647a40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84820000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ad000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542638c r4:85426000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8542638c r4:855dcf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84820000 r8:855dcf2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855dcf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855dcf00 r8:8027ed34 r7:eb68de60 r6:85631a00 r5:84820000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6bdfb0 to 0xeb6bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85647440 INFO: task kworker/1:385:5170 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bf092000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:386:5174 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:386 state:D stack:0 pid:5174 tgid:5174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb6e9d84 r8:00000002 r7:60000013 r6:eb6e9d8c r5:84823000 r4:84823000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84823000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647c40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84823000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ff000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85426b8c r4:85426800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85426b8c r4:855dcf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84823000 r8:855dcfac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855dcf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855dcf80 r8:8027ed34 r7:eb68de60 r6:85631a80 r5:84823000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6e9fb0 to 0xeb6e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85647940 INFO: task kworker/1:386:5174 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: bf2a8000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:387:5176 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:387 state:D stack:0 pid:5176 tgid:5176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb709d84 r8:00000002 r7:60000113 r6:eb709d8c r5:84821800 r4:84821800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84821800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb709e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647080 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84821800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb179000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542778c r4:85427400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8542778c r4:85645000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84821800 r8:8564502c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:00000000 r5:8501338c r4:85013000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:854d3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb681e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647d80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb123000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85426f8c r4:85426c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85426f8c r4:85645080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d3000 r8:856450ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645080 r8:8027ed34 r7:eb709e60 r6:85645100 r5:854d3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb681fb0 to 0xeb681ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856479c0 INFO: task kworker/1:388:5177 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:854d5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:854d5400 r8:856451ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85647d00 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:390:5181 blocked for more than 465 seconds. r5:854d6000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85645280 r8:8027ed34 r7:eb709e60 r6:85645300 r5:854d6000 r4:85647d00 Call trace: Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:391:5184 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:391 state:D stack:0 pid:5184 tgid:5184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7f9d84 r8:00000002 r7:60000013 r6:eb7f9d8c r5:84820c00 r4:84820c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84820c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563d280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84820c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85427f8c r4:85427c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85427f8c r4:85645380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84820c00 r8:856453ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645380 r8:8027ed34 r7:eb719e60 r6:85631b80 r5:84820c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f9fb0 to 0xeb7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563d100 INFO: task kworker/1:391:5184 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84823c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7fde08 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8511d78c r4:85645400 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:393 state:D stack:0 pid:5186 tgid:5186 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84824800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb801e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563d400 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84824800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844d9f8c r4:844d9c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844d9f8c r4:85645480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84824800 r8:856454ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645480 r8:8027ed34 r7:eb7fde60 r6:85631c80 r5:84824800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb801fb0 to 0xeb801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563d100 INFO: task kworker/1:393:5186 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c0801000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84822400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb809e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:844d9b8c r4:85645500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 r4:8563d240 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 1d20: c0b7e000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:395:5190 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:395 state:D stack:0 pid:5190 tgid:5190 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb811d84 r8:00000002 r7:60000113 r6:eb811d8c r5:84825400 r4:84825400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84825400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85645580 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: c0d8f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:5192 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:5192 tgid:5192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb819d84 r8:00000002 r7:60000113 r6:eb819d8c r5:84826000 r4:84826000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84826000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb819e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563d7c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84826000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844d938c r4:844d9000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844d938c r4:85645680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84826000 r8:856456ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645680 r8:8027ed34 r7:eb7fde60 r6:85631e00 r5:84826000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb819fb0 to 0xeb819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563d540 INFO: task kworker/1:396:5192 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c100c000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:397:5194 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:397 state:D stack:0 pid:5194 tgid:5194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb821d84 r8:00000002 r7:60000013 r6:eb821d8c r5:85668c00 r4:85668c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85668c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563d980 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85668c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ed000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e438c r4:847e4000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e438c r4:85645600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85668c00 r8:8564562c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645600 r8:8027ed34 r7:eb7fde60 r6:85631e80 r5:85668c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb821fb0 to 0xeb821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563d380 INFO: task kworker/1:397:5194 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c12ba000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:5196 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:5196 tgid:5196 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb829d84 r8:00000002 r7:60000113 r6:eb829d8c r5:85668000 r4:85668000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85668000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563dac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85668000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb621000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e478c r4:847e4400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e478c r4:85645700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85668000 r8:8564572c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645700 r8:8027ed34 r7:eb7fde60 r6:85631f00 r5:85668000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0771fb0 to 0xe0771ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:399:5198 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:399 state:D stack:0 pid:5198 tgid:5198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb831d84 r8:00000002 r7:60000013 r6:eb831d8c r5:8566b000 r4:8566b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8566b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb831e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563dc00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8566b000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb66d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e4b8c r4:847e4800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e4b8c r4:85645780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8566b000 r8:856457ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645780 r8:8027ed34 r7:eb7fde60 r6:85631f80 r5:8566b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb831fb0 to 0xeb831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563d880 INFO: task kworker/1:399:5198 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c19a8000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:8566bc00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb839e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563dd00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8566bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6a5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e4f8c r4:847e4c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e4f8c r4:85645800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8566bc00 r8:8564582c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645800 r8:8027ed34 r7:eb7fde60 r6:85621000 r5:8566bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb839fb0 to 0xeb839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563da80 INFO: task kworker/1:400:5200 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c19a8000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r4:847da880 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:401:5202 blocked for more than 466 seconds. Workqueue: events bpf_prog_free_deferred r5:8566c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb841e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563de40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8566c800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e538c r4:847e5000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e538c r4:85645880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8566c800 r8:856458ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645880 r8:8027ed34 r7:eb7fde60 r6:85621080 r5:8566c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb841fb0 to 0xeb841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563dbc0 INFO: task kworker/1:401:5202 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c2068000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8497f8c0 task:kworker/1:402 state:D stack:0 pid:5204 tgid:5204 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8566d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:847e578c r4:85645900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c2068000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:403:5206 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:5206 tgid:5206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb851d84 r8:00000002 r7:60000113 r6:eb851d8c r5:85669800 r4:85669800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85669800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb851e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85646640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85669800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb705000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e5b8c r4:847e5800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e5b8c r4:85645980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85669800 r8:856459ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645980 r8:8027ed34 r7:eb7fde60 r6:85621180 r5:85669800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb851fb0 to 0xeb851ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:404 state:D stack:0 pid:5208 tgid:5208 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8566a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb861e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b1440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8566a400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb729000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e5f8c r4:847e5c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e5f8c r4:85645a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8566a400 r8:85645a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645a00 r8:8027ed34 r7:eb7fde60 r6:85621200 r5:8566a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb861fb0 to 0xeb861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b1300 INFO: task kworker/1:404:5208 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c2725000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8566e000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e638c r4:85645a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8566e000 r8:85645aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85645a80 r8:8027ed34 r7:eb7fde60 r6:85621280 r5:8566e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b5fb0 to 0xeb5b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85646f80 INFO: task kworker/1:405:5210 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c28b5000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8497f8c0 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8566ec00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb865e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85627880 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8566ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa51000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cf38c r4:855cf000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cf38c r4:85621300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8566ec00 r8:8562132c r7:82804d40 r6:dddced40 r5:dddced60 r4:85621300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85621300 r8:8027ed34 r7:eb699e60 r6:85621380 r5:8566ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb865fb0 to 0xeb865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85627d00 INFO: task kworker/0:637:5214 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c2ae7000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:638 state:D stack:0 pid:5215 tgid:5215 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84826c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:855cf78c r4:855cf400 r10:61c88647 r9:84826c00 r8:8562142c r7:82804d40 r6:dddced40 r5:dddced60 r4:85621400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85621400 r8:8027ed34 r7:eb865e60 r6:85621480 r5:84826c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c9fb0 to 0xeb6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85627d80 INFO: task kworker/0:638:5215 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c2d63000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85670000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85621500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85621500 r8:8027ed34 r7:eb6c9e60 r6:85621580 r5:85670000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb779fb0 to 0xeb779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85627f40 INFO: task kworker/0:639:5219 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfa99000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85670c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85621600 r8:8027ed34 r7:eb779e60 r6:85621680 r5:85670c00 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c3213000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:641:5221 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:641 state:D stack:0 pid:5221 tgid:5221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb72dd84 r8:00000002 r7:60000113 r6:eb72dd8c r5:85671800 r4:85671800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85671800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856277c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85671800 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeeb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855cff8c r4:855cfc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855cff8c r4:85621700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85671800 r8:8562172c r7:82804d40 r6:dddced40 r5:dddced60 r4:85621700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:642:5224 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:642 state:D stack:0 pid:5224 tgid:5224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7b1d84 r8:00000002 r7:60000013 r6:eb7b1d8c r5:85672400 r4:85672400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85672400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562c040 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d20: c39e6000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:643:5226 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:643 state:D stack:0 pid:5226 tgid:5226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7cdd84 r8:00000002 r7:60000013 r6:eb7cdd8c r5:85673000 r4:85673000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85673000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562c280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85673000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511cb8c r4:8511c800 r7:dddced40 r6:83018000 r5:8511cb8c r4:85621900 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0771dc0 r5:00001000 r4:dfa99000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:644:5228 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:644 state:D stack:0 pid:5228 tgid:5228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7bdd84 r8:00000002 r7:60000013 r6:eb7bdd8c r5:85673c00 r4:85673c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85673c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562c480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85673c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb089000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511cf8c r4:8511cc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511cf8c r4:85621a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85673c00 r8:85621a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85621a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85621a00 r8:8027ed34 r7:eb7cde60 r6:85621a80 r5:85673c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7bdfb0 to 0xeb7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:644:5228 is blocked on a mutex likely owned by task kworker/1:227:3838. [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:645:5230 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:645 state:D stack:0 pid:5230 tgid:5230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7ddd84 r8:00000002 r7:60000013 r6:eb7ddd8c r5:85674800 r4:85674800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85674800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85621b00 r8:8027ed34 r7:eb7bde60 r6:85621b80 r5:85674800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0771dc0 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:646 state:D stack:0 pid:5232 tgid:5232 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85676000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562cbc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85676000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511df8c r4:8511dc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511df8c r4:85621c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85676000 r8:85621c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85621c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85621c00 r8:8027ed34 r7:eb7dde60 r6:85621c80 r5:85676000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e9fb0 to 0xeb7e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562c440 INFO: task kworker/0:646:5232 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c432e000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85675400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb871e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562cb00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85675400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb361000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:647:5234 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 1d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:eb869d84 r8:00000002 r7:60000113 r6:eb869d8c r5:854d4800 r4:854d4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e6b8c r4:847e6800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e6b8c r4:85645b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d4800 r8:85645b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85645b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeb869fb0 to 0xeb869ff8) INFO: task kworker/1:406:5235 is blocked on a mutex likely owned by task kworker/1:227:3838. 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:e0771dc0 r5:00001000 r4:dfa99000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8481d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614180 r7:ddde2d40 r6:83018200 r5:847e678c r4:85645c00 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r5:00001000 r4:dfa99000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:648:5240 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:648 state:D stack:0 pid:5240 tgid:5240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb881d84 r8:00000002 r7:60000013 r6:eb881d8c r5:8554d400 r4:8554d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8554d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb881e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562cd00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8554d400 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb415000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511e38c r4:8511e000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511e38c r4:85621e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r4:85678000 r5:85678000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8562ca40 Call trace: 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:650:5243 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:650 state:D stack:0 pid:5243 tgid:5243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb88dd84 r8:00000002 r7:60000113 r6:eb88dd8c r5:85678c00 r4:85678c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85678c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb88de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562cdc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85678c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511e78c r4:8511e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511e78c r4:85621f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85678c00 r8:85621f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85621f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85621f00 r8:8027ed34 r7:eb889e60 r6:85645e00 r5:85678c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb88dfb0 to 0xeb88dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562ca40 INFO: task kworker/0:650:5243 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c53c9000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:651 state:D stack:0 pid:5245 tgid:5245 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562ce80 INFO: task kworker/0:651:5245 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c58db000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:85679800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb89de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562c580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85679800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb50b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0771dc0 r5:00001000 r4:dfa99000 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/1:408:5250 blocked for more than 467 seconds. r10:829187f4 r9:eb8a1d84 r8:00000002 r7:60000113 r6:eb8a1d8c r5:8567b000 r5:8567b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c5b31000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:409:5252 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:5252 tgid:5252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb899d84 r8:00000002 r7:60000113 r6:eb899d8c r5:8567c800 r4:8567c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8567c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb899e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563a300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8567c800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb71d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e738c r4:847e7000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e738c r4:8563e080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8567c800 r8:8563e0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c5d33000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:653:5254 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:653 state:D stack:0 pid:5254 tgid:5254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb86dd84 r8:00000002 r7:60000113 r6:eb86dd8c r5:8567d400 r4:8567d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8567d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb86de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85626500 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8567d400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb86dfb0 to 0xeb86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562cf40 INFO: task kworker/0:653:5254 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c6041000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:410:5255 blocked for more than 467 seconds. r5:8567e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb875e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563a4c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8567e000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb761000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e778c r4:847e7400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e778c r4:8563e200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8567e000 r8:8563e22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8563e200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563e200 r8:8027ed34 r7:eb899e60 r6:8563e280 r5:8567e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb875fb0 to 0xeb875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563a180 INFO: task kworker/1:410:5255 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c63f7000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:411:5257 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:411 state:D stack:0 pid:5257 tgid:5257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8a5d84 r8:00000002 r7:60000113 r6:eb8a5d8c r5:8567ec00 r4:8567ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8567ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654bc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8567ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1f1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:8569438c r4:8563e300 r10:00000000 r9:8563e300 r8:8027ed34 r7:eb875e60 r6:8563e380 r5:8567ec00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0771d20 to 0xe0771d68) 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:5260 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:412 state:D stack:0 pid:5260 tgid:5260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8b1d84 r8:00000002 r7:60000113 r6:eb8b1d8c r5:854d2400 r4:854d2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563ab80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:854d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb85d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e7b8c r4:847e7800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e7b8c r4:8563e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d2400 r8:8563e42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8563e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563e400 r8:8027ed34 r7:eb8a5e60 r6:8563e480 r5:854d2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b1fb0 to 0xeb8b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563a540 INFO: task kworker/1:412:5260 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c6415000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:854d8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85626400 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb78d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511f78c r4:8511f400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511f78c r4:8563c180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d8000 r8:8563c1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563c180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563c180 r8:8027ed34 r7:eb86de60 r6:8563e500 r5:854d8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b9fb0 to 0xeb8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856264c0 INFO: task kworker/0:654:5262 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c690a000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:655 state:D stack:0 pid:5263 tgid:5263 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854d8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8bde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85626780 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a438c r4:856a4000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a438c r4:8563c200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d8c00 r8:8563c22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563c200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563c200 r8:8027ed34 r7:eb86de60 r6:8563e580 r5:854d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8bdfb0 to 0xeb8bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856264c0 INFO: task kworker/0:655:5263 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c690a000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:656:5266 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:656 state:D stack:0 pid:5266 tgid:5266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8cdd84 r8:00000002 r7:60000113 r6:eb8cdd8c r5:854db000 r4:854db000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854db000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85626680 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854db000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511ff8c r4:8511fc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8511ff8c r4:8563c100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854db000 r8:8563c12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563c100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563c100 r8:8027ed34 r7:eb8bde60 r6:8563e600 r5:854db000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8cdfb0 to 0xeb8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85626340 INFO: task kworker/0:656:5266 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c6d27000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:657:5268 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:657 state:D stack:0 pid:5268 tgid:5268 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854dbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:eb8f9000 r5:856a4b8c r4:856a4800 r10:61c88647 r9:854dbc00 r8:8563c2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e1fb0 to 0xeb8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85626700 INFO: task kworker/0:657:5268 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c7236000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:854dd400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:854dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r7:ddde2d40 r6:83018200 r5:844da38c r4:8563e700 r4:8563e700 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8edfb0 to 0xeb8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563adc0 INFO: task kworker/1:413:5270 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c747c000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:658:5271 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:658 state:D stack:0 pid:5271 tgid:5271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8f5d84 r8:00000002 r7:60000113 r6:eb8f5d8c r5:854d9800 r4:854d9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85626640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8e5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a478c r4:856a4400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a478c r4:8563c380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d9800 r8:8563c3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563c380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c747c000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:659:5273 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:659 state:D stack:0 pid:5273 tgid:5273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb901d84 r8:00000002 r7:60000113 r6:eb901d8c r5:854dec00 r4:854dec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854dec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb901e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85626bc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb909000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:854dec00 r8:8563c32c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:659:5273 is blocked on a mutex likely owned by task kworker/1:227:3838. r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c775f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:660:5275 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:660 state:D stack:0 pid:5275 tgid:5275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb919d84 r8:00000002 r7:60000013 r6:eb919d8c r5:854da400 r4:854da400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854da400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb919e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85626cc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854da400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb915000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a538c r4:856a5000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a538c r4:8563c400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854da400 r8:8563c42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563c400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563c400 r8:8027ed34 r7:eb901e60 r6:8563e900 r5:854da400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb919fb0 to 0xeb919ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:e0771dc0 r5:00001000 r4:dfa99000 r4:847da880 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:661:5277 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:661 state:D stack:0 pid:5277 tgid:5277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb929d84 r8:00000002 r7:60000013 r6:eb929d8c r5:854dc800 r4:854dc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854dc800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb929e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564fe00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a878c r4:856a8400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a878c r4:8563c480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854dc800 r8:8563c4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563c480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563c480 r8:8027ed34 r7:eb919e60 r6:8563e980 r5:854dc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb929fb0 to 0xeb929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85626a00 INFO: task kworker/0:661:5277 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c7fe2000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:5279 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:662 state:D stack:0 pid:5279 tgid:5279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8a9d84 r8:00000002 r7:60000113 r6:eb8a9d8c r5:854de000 r4:854de000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854de000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85626e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854de000 r7:00000000 r6:83018000 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbc9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a578c r4:856a5400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a578c r4:8563c500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854de000 r8:8563c52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563c500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563c500 r8:8027ed34 r7:eb929e60 r6:8563ea00 r5:854de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a9fb0 to 0xeb8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85626b00 INFO: task kworker/0:662:5279 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c7fe2000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:663:5283 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:663 state:D stack:0 pid:5283 tgid:5283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb67dd84 r8:00000002 r7:60000113 r6:eb67dd8c r5:854d6c00 r4:854d6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854d6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb67de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85626f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a5b8c r4:856a5800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a5b8c r4:8563c580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854d6c00 r8:8563c5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563c580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563c580 r8:8027ed34 r7:eb929e60 r6:8563ea80 r5:854d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb67dfb0 to 0xeb67dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85626d40 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:664 state:D stack:0 pid:5284 tgid:5284 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8563c680 r8:8027ed34 r7:eb929e60 r6:8563eb00 r5:854e0000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:665:5286 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:665 state:D stack:0 pid:5286 tgid:5286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb7f1d84 r8:00000002 r7:60000013 r6:eb7f1d8c r5:854e1800 r4:854e1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564f040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a638c r4:856a6000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a638c r4:8563c600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e1800 r8:8563c62c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563c600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563c600 r8:8027ed34 r7:eb929e60 r6:8563eb80 r5:854e1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f1fb0 to 0xeb7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c8d40000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:666:5288 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:666 state:D stack:0 pid:5288 tgid:5288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb92dd84 r8:00000002 r7:60000013 r6:eb92dd8c r5:854e0c00 r4:854e0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:854e0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:854e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r5:856a678c r4:856a6400 r10:61c88647 r9:854e0c00 r8:8563c72c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeb92dfb0 to 0xeb92dff8) r4:8564f200 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8501338c r4:85013000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:667 state:D stack:0 pid:5290 tgid:5290 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:854e2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb935e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564f440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead31000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a6b8c r4:856a6800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a6b8c r4:8563c780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e2400 r8:8563c7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563c780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563c780 r8:8027ed34 r7:eb929e60 r6:8563ec80 r5:854e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb935fb0 to 0xeb935ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8564f140 INFO: task kworker/0:667:5290 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c9000000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:668:5292 blocked for more than 467 seconds. r5:854e3000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564f580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a6f8c r4:856a6c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a6f8c r4:8563c800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e3000 r8:8563c82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563c800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563c800 r8:8027ed34 r7:eb929e60 r6:8563ed00 r5:854e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb93dfb0 to 0xeb93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8564f240 INFO: task kworker/0:668:5292 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c9387000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:669:5294 blocked for more than 467 seconds. Workqueue: events bpf_prog_free_deferred r4:854e3c00 r5:854e3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r9:83018005 r8:854e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 r10:61c88647 r9:854e3c00 r8:8563c8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8564f400 Call trace: 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:854e5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb949e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564f7c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae97000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a778c r4:856a7400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a778c r4:8563c980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e5400 r8:8563c9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563c980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563c980 r8:8027ed34 r7:eb929e60 r6:8563ee00 r5:854e5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb949fb0 to 0xeb949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8564f840 INFO: task kworker/0:670:5296 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c965c000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:854e6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb951e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:854e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:854e6c00 r8:8563c92c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80070013 ffffffff r4:e0771dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:672:5300 blocked for more than 467 seconds. r5:854e6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:854e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb113000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a7f8c r4:856a7c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a7f8c r4:8563ca00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e6000 r8:8563ca2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563ca00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563ca00 r8:8027ed34 r7:eb929e60 r6:8563ef00 r5:854e6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb959fb0 to 0xeb959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8564f780 INFO: task kworker/0:672:5300 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: c9e07000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:854e4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe0771d20 to 0xe0771d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:674:5305 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:674 state:D stack:0 pid:5305 tgid:5305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb941d84 r8:00000002 r7:60000113 r6:eb941d8c r5:856f0000 r4:856f0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb941e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85626ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb48f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a8f8c r4:856a8c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a8f8c r4:8563cb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f0000 r8:8563cb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563cb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563cb00 r8:8027ed34 r7:eb929e60 r6:856ce000 r5:856f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb941fb0 to 0xeb941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8564fb40 INFO: task kworker/0:674:5305 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:675:5307 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:675 state:D stack:0 pid:5307 tgid:5307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:84913c00 r4:84913c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84913c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8564fa40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84913c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb461000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a8b8c r4:856a8800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a8b8c r4:8563cb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84913c00 r8:8563cbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563cb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563cb80 r8:8027ed34 r7:eb941e60 r6:8563cc00 r5:84913c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0771d20 to 0xe0771d68) r5:80070013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:856f0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:414:5308 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ca33a000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:415:5310 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:415 state:D stack:0 pid:5310 tgid:5310 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:856f1800 r5:856f1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:8569478c r4:85694400 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80070013 ffffffff r4:00000000 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:676:5313 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:676 state:D stack:0 pid:5313 tgid:5313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb971d84 r8:00000002 r7:60000013 r6:eb971d8c r5:856f3000 r4:856f3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb971e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b1500 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:856f3000 r8:8563ccac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bd0 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:856f2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cd480 r10:61c88647 r9:856f2400 r8:8563cd2c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: cab63000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:678:5317 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:678 state:D stack:0 pid:5317 tgid:5317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:856f5400 r5:856f5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb981fb0 to 0xeb981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856cd080 INFO: task kworker/0:678:5317 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: cad52000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8501338c r4:85013000 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/0:679:5318 blocked for more than 467 seconds. r4:856f3c00 r5:856f3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb985e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cd040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb685000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a9b8c r4:856a9800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a9b8c r4:8563ce00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f3c00 r8:8563ce2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563ce00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563ce00 r8:8027ed34 r7:eb979e60 r6:856ce400 r5:856f3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb985fb0 to 0xeb985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856cd080 INFO: task kworker/0:679:5318 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: cb069000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:680:5320 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:680 state:D stack:0 pid:5320 tgid:5320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb98dd84 r8:00000002 r7:60000013 r6:eb98dd8c r5:856f4800 r4:856f4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb98de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cd300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6cf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856a9f8c r4:856a9c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856a9f8c r4:8563ce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f4800 r8:8563ceac r7:82804d40 r6:dddced40 r5:dddced60 r4:8563ce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563ce80 r8:8027ed34 r7:eb979e60 r6:856ce480 r5:856f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb98dfb0 to 0xeb98dff8) dfa0: 00000000 00000000 00000000 00000000 r4:856cd240 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:eb999d84 r8:00000002 r7:60000113 r6:eb999d8c r5:856f8c00 r4:856f8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb999e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cda00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb82d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ab38c r4:856ab000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856ab38c r4:8563cf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f8c00 r8:8563cf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8563cf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8563cf00 r8:8027ed34 r7:eb979e60 r6:856ce500 r5:856f8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb999fb0 to 0xeb999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856cd440 INFO: task kworker/0:681:5324 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: cb634000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:eb99dd84 r8:00000002 r7:60000113 r6:eb99dd8c r5:856f9800 r5:856f9800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cd5c0 r7:dddced40 r6:83018000 r5:856aa78c r4:8563cf80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bd0 r4:e0771dc0 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:683:5326 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:683 state:D stack:0 pid:5326 tgid:5326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9a1d84 r8:00000002 r7:60000113 r6:eb9a1d8c r5:856fa400 r4:856fa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856fa400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cd7c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856aab8c r4:856aa800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856aab8c r4:8570e000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fa400 r8:8570e02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8570e000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570e000 r8:8027ed34 r7:eb999e60 r6:856ce600 r5:856fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a1fb0 to 0xeb9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856cd440 INFO: task kworker/0:683:5326 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: cbc1f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:684:5328 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:684 state:D stack:0 pid:5328 tgid:5328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9a5d84 r8:00000002 r7:60000113 r6:eb9a5d8c r5:856fb000 r4:856fb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856fb000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cd880 r5:856aaf8c r4:856aac00 r10:61c88647 r9:856fb000 r8:8570e0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8570e080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570e080 r8:8027ed34 r7:eb999e60 r6:856ce680 r5:856fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a5fb0 to 0xeb9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856cd700 INFO: task kworker/0:684:5328 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: cbc1f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:416:5331 blocked for more than 467 seconds. Workqueue: events bpf_prog_free_deferred r5:856fbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb965fb0 to 0xeb965ff8) Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r5:00001000 r4:dfa99000 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:5333 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:5333 tgid:5333 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9a9d84 r8:00000002 r7:60000113 r6:eb9a9d8c r5:856fc800 r4:856fc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856fc800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cdb40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb83d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ab78c r4:856ab400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856ab78c r4:8570e100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fc800 r8:8570e12c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xeb9a9fb0 to 0xeb9a9ff8) Call trace: 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:856fd400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:856abb8c r4:856ab800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856abb8c r4:8570e180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fd400 r8:8570e1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8570e180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570e180 r8:8027ed34 r7:eb9a9e60 r6:856ce880 r5:856fd400 Exception stack(0xeb9adfb0 to 0xeb9adff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0771d20 to 0xe0771d68) 1d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:00000000 r5:00001000 r4:dfa99000 r5:8501338c r4:85013000 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:856f8000 r5:856f8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cdd80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:856f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb925000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856abf8c r4:856abc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856abf8c r4:8570e200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856f8000 r8:8570e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8570e200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570e200 r8:8027ed34 r7:eb9ade60 r6:856ce900 r5:856f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c1fb0 to 0xeb9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856cdac0 INFO: task kworker/0:687:5338 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: cc3de000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 r5:8501338c r4:85013000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:688:5339 blocked for more than 468 seconds. r4:856f6c00 r5:856f6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:856cdc00 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ccc8b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:689:5340 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:689 state:D stack:0 pid:5340 tgid:5340 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9c9d84 r8:00000002 r7:60000113 r6:eb9c9d8c r5:856f6000 r4:856f6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856f6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856cdf40 r4:00000000 r9:83018005 r8:856f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 r4:8570e300 Exception stack(0xeb9c9fb0 to 0xeb9c9ff8) task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0771dc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:690:5343 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:690 state:D stack:0 pid:5343 tgid:5343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9e5d84 r8:00000002 r7:60000113 r6:eb9e5d8c r5:85740c00 r4:85740c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85740c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85654440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85740c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9dd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856acb8c r4:856ac800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856acb8c r4:8570e380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85740c00 r8:8570e3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8570e380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570e380 r8:8027ed34 r7:eb9c5e60 r6:856cea80 r5:85740c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e5fb0 to 0xeb9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:00000000 r5:00001000 r4:dfa99000 r5:8501338c r4:85013000 r4:847da880 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:691:5344 blocked for more than 468 seconds. r5:85741800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85718100 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85741800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9b3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ad38c r4:856ad000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856ad38c r4:8570e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85741800 r8:8570e42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8570e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570e400 r8:8027ed34 r7:eb9e5e60 r6:856ceb00 r5:85741800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85654180 INFO: task kworker/0:691:5344 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: cd055000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:692:5347 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:692 state:D stack:0 pid:5347 tgid:5347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb781d84 r8:00000002 r7:60000013 r6:eb781d8c r5:85743000 r4:85743000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85743000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563df00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85743000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaef000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856acf8c r4:856acc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856acf8c r4:8570e480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85743000 r8:8570e4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8570e480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570e480 r8:8027ed34 r7:eb9f1e60 r6:856ceb80 r5:85743000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb781fb0 to 0xeb781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8563de00 INFO: task kworker/0:692:5347 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: cd56b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:693:5349 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:693 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb8d9d84 r8:00000002 r7:60000113 r6:eb8d9d8c r5:85743c00 r4:85743c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85743c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85718700 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85743c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf19000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856adf8c r4:856adc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856adf8c r4:8570e500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85743c00 r8:8570e52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8570e500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570e500 r8:8027ed34 r7:eb9f1e60 r6:856cec00 r5:85743c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d9fb0 to 0xeb8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857181c0 INFO: task kworker/0:693:5349 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: cd875000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:694 state:D stack:0 pid:5350 tgid:5350 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84916000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ad78c r4:856ad400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856ad78c r4:8570e580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84916000 r8:8570e5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8570e580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570e580 r8:8027ed34 r7:eb8d9e60 r6:8570e600 r5:84916000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f5fb0 to 0xeb9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857181c0 INFO: task kworker/0:694:5350 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: cd937000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:695:5353 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:695 state:D stack:0 pid:5353 tgid:5353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829187f4 r9:eb8ddd84 r8:00000002 r7:60000013 r6:eb8ddd8c r5:84914800 r5:84914800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8dde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85718440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84914800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856adb8c r4:856ad800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856adb8c r4:8570e680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84914800 r8:8570e6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8570e680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570e680 r8:8027ed34 r7:eb8d9e60 r6:8570e700 r5:84914800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8ddfb0 to 0xeb8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857182c0 INFO: task kworker/0:695:5353 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: cddb2000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r5:8501338c r4:85013000 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:84915400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb96de08 r9:83018005 r8:84915400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856aeb8c r4:856ae800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856aeb8c r4:8570e780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84915400 r8:8570e7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8570e780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8570e780 r8:8027ed34 r7:eb8d9e60 r6:8570e800 r5:84915400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb96dfb0 to 0xeb96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r5:80070013 r4:80239bd0 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84911800 r4:829187f0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85718640 1d20: ce225000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84916c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb905e08 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857182c0 INFO: task kworker/0:698:5359 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ce6eb000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:699:5361 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:699 state:D stack:0 pid:5361 tgid:5361 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb90dd84 r8:00000002 r7:60000013 r6:eb90dd8c r5:84913000 r4:84913000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84913000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85718680 INFO: task kworker/0:699:5361 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ce6eb000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eb91dd84 r8:00000002 r7:60000013 r6:eb91dd8c r5:84912400 r5:84912400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85718fc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84912400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb91dfb0 to 0xeb91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85718900 INFO: task kworker/0:700:5363 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r5:8501338c r4:85013000 r4:00000001 task:kworker/0:701 state:D stack:0 pid:5365 tgid:5365 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85720840 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:702:5366 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:702 state:D stack:0 pid:5366 tgid:5366 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9fdd84 r8:00000002 r7:60000013 r6:eb9fdd8c r5:85676c00 r4:85676c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85676c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9fde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857200c0 r7:dddced40 r6:83018000 r5:856af78c r4:8570ed80 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ceeac000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:829187f4 r9:eba01d84 r8:00000002 r7:60000013 r6:eba01d8c r5:84960000 r4:84960000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84960000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85720400 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84960000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84960000 r8:8570eeac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: cef8a000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:704:5371 blocked for more than 468 seconds. r5:84961800 r4:829187f0 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84961800 r8:8570efac r7:82804d40 r6:dddced40 r5:dddced60 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:705:5373 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:705 state:D stack:0 pid:5373 tgid:5373 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba09d84 r8:00000002 r7:60000013 r6:eba09d8c r5:84960c00 r5:84960c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 9fa0: 00000000 00000000 00000000 00000000 r4:e0771dc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:829187f4 r9:eb8c1d84 r8:00000002 r7:60000013 r6:eb8c1d8c r5:84963000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85720b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84963000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b8b8c r4:856b8800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b8b8c r4:8571a180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84963000 r8:8571a1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8571a180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571a180 r8:8027ed34 r7:eba09e60 r6:8571a200 r5:84963000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:80070013 r4:80239bd0 r4:00000000 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 task:kworker/0:707 state:D stack:0 pid:5378 tgid:5378 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba0de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85720cc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84963c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb755000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b8f8c r4:856b8c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b8f8c r4:8571a280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84963c00 r8:8571a2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8571a280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b978c r4:856b9400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b978c r4:8571a480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84965400 r8:8571a4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8571a480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571a480 r8:8027ed34 r7:eba11e60 r6:8571a500 r5:84965400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba15fb0 to 0xeba15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85720c40 INFO: task kworker/0:709:5382 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d03dd000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:710:5384 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:710 state:D stack:0 pid:5384 tgid:5384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba19d84 r8:00000002 r7:60000113 r6:eba19d8c r5:84966000 r4:84966000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84966000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85728100 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84966000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb877000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b9f8c r4:856b9c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b9f8c r4:8571a580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84966000 r8:8571a5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8571a580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571a580 r8:8027ed34 r7:eba15e60 r6:8571a600 r5:84966000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba19fb0 to 0xeba19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85720ec0 INFO: task kworker/0:710:5384 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d0844000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:711:5386 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:711 state:D stack:0 pid:5386 tgid:5386 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba1dd84 r8:00000002 r7:60000013 r6:eba1dd8c r5:84966c00 r4:84966c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84966c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85614680 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84966c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b9b8c r4:856b9800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b9b8c r4:8571a680 r10:00000000 r9:8571a680 r8:8027ed34 r7:eba19e60 r6:8571a700 r5:84966c00 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:712:5388 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:712 state:D stack:0 pid:5388 tgid:5388 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba25d84 r8:00000002 r7:60000013 r6:eba25d8c r5:84910000 r4:84910000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84910000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85728680 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84910000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ba78c r4:856ba400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856ba78c r4:8571a780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84910000 r8:8571a7ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:8571a780 r8:8027ed34 r7:eba19e60 r6:8571a800 r5:84910000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: d0ca7000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85738000 r5:85738000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:eb88f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856ba38c r4:856ba000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856ba38c r4:8571a880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85738000 r8:8571a8ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8571a880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571a880 r8:8027ed34 r7:eba25e60 r6:8571a900 r5:85738000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba29fb0 to 0xeba29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85728300 INFO: task kworker/0:713:5390 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d0f33000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:714:5392 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:714 state:D stack:0 pid:5392 tgid:5392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba2dd84 r8:00000002 r7:60000113 r6:eba2dd8c r5:85739800 r4:85739800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85739800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85728a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85739800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8e9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856baf8c r4:856bac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856baf8c r4:8571a980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85739800 r8:8571a9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8571a980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeba2dfb0 to 0xeba2dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d115f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 r4:85738c00 r5:85738c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:856bab8c r4:8571aa80 r10:00000000 r9:8571aa80 r8:8027ed34 r7:eba2de60 r6:8571ab00 r5:85738c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:857283c0 Workqueue: events bpf_prog_free_deferred 1d20: d115f000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba35d84 r8:00000002 r7:60000113 r6:eba35d8c r5:8573a400 r4:8573a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8573a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba35e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849dc200 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8573a400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577078c r4:85770400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577078c r4:8571ab80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573a400 r8:8571abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8571ab80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571ab80 r8:8027ed34 r7:eba2de60 r6:8571ac00 r5:8573a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba35fb0 to 0xeba35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857285c0 INFO: task kworker/0:716:5396 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d158a000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:717:5398 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:717 state:D stack:0 pid:5398 tgid:5398 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba39d84 r8:00000002 r7:60000113 r6:eba39d8c r5:8573c800 r4:8573c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8573c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba39e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8571ac80 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 r4:857285c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0771d20 to 0xe0771d68) r5:80070013 r4:80239bd0 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:5402 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:5402 tgid:5402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9e9d84 r8:00000002 r7:60000113 r6:eb9e9d8c r5:8573bc00 r4:8573bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8573bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9e9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85721c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8573bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead05000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85695f8c r4:85695c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85695f8c r4:856cec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573bc00 r8:856cecac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856cec80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856cec80 r8:8027ed34 r7:eb95de60 r6:8571ad80 r5:8573bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e9fb0 to 0xeb9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85721780 INFO: task kworker/1:417:5402 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d19ec000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Call trace: r5:85745400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85721a40 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85745400 r8:856ced2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:856ced00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856ced00 r8:8027ed34 r7:eb9e9e60 r6:856ced80 r5:85745400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba21fb0 to 0xeba21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85721780 INFO: task kworker/1:418:5403 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d1d7b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:419:5405 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:419 state:D stack:0 pid:5405 tgid:5405 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb9d5d84 r8:00000002 r7:60000013 r6:eb9d5d8c r5:85746000 r5:85746000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d5e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8569638c r4:85696000 r10:61c88647 r9:85746000 r8:856cee2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d1d7b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:420:5408 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:420 state:D stack:0 pid:5408 tgid:5408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba3dd84 r8:00000002 r7:60000113 r6:eba3dd8c r5:85746c00 r4:85746c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85746c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba3de08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8569678c r4:856cef00 r10:00000000 r9:856cef00 r8:8027ed34 r7:eb9d5e60 r6:856cef80 r5:85746c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: d1d7b000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0771fb0 to 0xe0771ff8) r4:8497f8c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85740000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85708e80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85740000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb955000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bb78c r4:856bb400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856bb78c r4:8571ae00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85740000 r8:8571ae2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8571ae00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8571ae00 r8:8027ed34 r7:eba35e60 r6:85711080 r5:85740000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb991fb0 to 0xeb991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85728ec0 INFO: task kworker/0:718:5409 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d21cd000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:421:5410 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:5410 tgid:5410 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba49d84 r8:00000002 r7:60000113 r6:eba49d8c r5:85744800 r4:85744800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85744800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85721340 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85744800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d2753000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:422:5413 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:422 state:D stack:0 pid:5413 tgid:5413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba45d84 r8:00000002 r7:60000013 r6:eba45d8c r5:85742400 r4:85742400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85742400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba45e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 1d20: d2753000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8497f8c0 Call trace: r5:856fe000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570f040 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb193000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569778c r4:85697400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8569778c r4:85711280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fe000 r8:857112ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85711280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85711280 r8:8027ed34 r7:eba45e60 r6:85711300 r5:856fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba51fb0 to 0xeba51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8570ab00 INFO: task kworker/1:423:5414 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d2ab7000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:8497f8c0 task:kworker/1:424 state:D stack:0 pid:5416 tgid:5416 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856fec00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba4de08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b1540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb153000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8569738c r4:85697000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8569738c r4:85711380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856fec00 r8:857113ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85711380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85711380 r8:8027ed34 r7:eba51e60 r6:85711400 r5:856fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba4dfb0 to 0xeba4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:857214c0 INFO: task kworker/1:424:5416 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d2ab7000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:425:5419 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred r5:85750000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:85750000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85750000 r8:8571152c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85711500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85711500 r8:8027ed34 r7:eba51e60 r6:85711580 r5:85750000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba55fb0 to 0xeba55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8570f280 INFO: task kworker/1:425:5419 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d3014000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:5420 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:5420 tgid:5420 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85750c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85697b8c r4:85697800 r10:00000000 r9:85711480 r8:8027ed34 r7:eba55e60 r6:85711600 r5:85750c00 r4:8570f1c0 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:427:5422 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:427 state:D stack:0 pid:5422 tgid:5422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba65d84 r8:00000002 r7:60000013 r6:eba65d8c r5:8573e000 r4:8573e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8573e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570f500 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8573e000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb471000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85697f8c r4:85697c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85697f8c r4:85711680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573e000 r8:857116ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85711680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85711680 r8:8027ed34 r7:eba55e60 r6:8571ae80 r5:8573e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba65fb0 to 0xeba65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0771dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0771fb0 to 0xe0771ff8) r4:8497f8c0 Not tainted 6.15.0-syzkaller #0 Call trace: r4:8573ec00 r5:8573ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849b1780 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8573ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb823000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85105b8c r4:85105800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85105b8c r4:85711700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573ec00 r8:8571172c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85711700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85711700 r8:8027ed34 r7:eba55e60 r6:8571af00 r5:8573ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba71fb0 to 0xeba71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8570f400 INFO: task kworker/1:428:5425 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d3a3d000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:429:5426 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:429 state:D stack:0 pid:5426 tgid:5426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba75d84 r8:00000002 r7:60000013 r6:eba75d8c r5:8573d400 r4:8573d400 r5:8573d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570f740 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8573b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570f880 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8573b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb66b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510438c r4:85104000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510438c r4:85711800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8573b000 r8:8571182c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85711800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85711800 r8:8027ed34 r7:eba71e60 r6:85651000 r5:8573b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba81fb0 to 0xeba81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8570f5c0 INFO: task kworker/1:430:5429 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d40e4000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:431:5430 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:431 state:D stack:0 pid:5430 tgid:5430 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba85d84 r8:00000002 r7:60000013 r6:eba85d8c r5:8567bc00 r4:8567bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8567bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570fa00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8567bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85711880 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:5433 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:432 state:D stack:0 pid:5433 tgid:5433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba91d84 r8:00000002 r7:60000113 r6:eba91d8c r5:848c9800 r4:848c9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848c9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570fb00 r5:00001000 r4:eb6f7000 r10:61c88647 r9:848c9800 r8:8571192c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8570f800 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r5:85751800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570fb80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85751800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85104f8c r4:85104c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85104f8c r4:85711a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85751800 r8:85711a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85711a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85711a00 r8:8027ed34 r7:eba71e60 r6:85711980 r5:85751800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba5dfb0 to 0xeba5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8570fc00 INFO: task kworker/1:433:5434 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d4814000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eba8dd84 r8:00000002 r7:60000013 r6:eba8dd8c r5:85752400 r5:85752400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:8510538c r4:85105000 r4:85711a80 Exception stack(0xeba8dfb0 to 0xeba8dff8) r4:8570fd00 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 r5:85753000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8570ff40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85753000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb80d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510578c r4:85105400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510578c r4:85711b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85753000 r8:85711bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85711b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85711b80 r8:8027ed34 r7:eba71e60 r6:85711c00 r5:85753000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba95fb0 to 0xeba95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8570fe80 INFO: task kworker/1:435:5438 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d4f41000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:436:5441 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:436 state:D stack:0 pid:5441 tgid:5441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85753c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba9de08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85711c80 dfa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d5095000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:848c8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb835000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85105f8c r4:85105c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85105f8c r4:85711d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848c8c00 r8:85711dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85711d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85711d80 r8:8027ed34 r7:eba9de60 r6:85651180 r5:848c8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa9fb0 to 0xebaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85644080 INFO: task kworker/1:437:5443 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80070013 ffffffff r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:848c8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85106f8c r4:85106c00 r4:85711e00 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0771dc0 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:5447 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:5447 tgid:5447 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebab9d84 r8:00000002 r7:60000113 r6:ebab9d8c r5:848cbc00 r4:848cbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644400 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ab000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510678c r4:85106400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510678c r4:85711e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cbc00 r8:85711eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85711e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85711e80 r8:8027ed34 r7:ebab5e60 r6:85651280 r5:848cbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab9fb0 to 0xebab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85644140 INFO: task kworker/1:439:5447 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: 1d20: d5bbe000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r4:00000000 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:440:5448 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:440 state:D stack:0 pid:5448 tgid:5448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebabdd84 r8:00000002 r7:60000013 r6:ebabdd8c r5:848cb000 r4:848cb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cb000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb923000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85106b8c r4:85106800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85106b8c r4:85711f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cb000 r8:85711f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85711f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85711f00 r8:8027ed34 r7:ebab5e60 r6:85651300 r5:848cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebabdfb0 to 0xebabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85644280 INFO: task kworker/1:440:5448 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d5ec2000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0771fb0 to 0xe0771ff8) r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:5450 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:5450 tgid:5450 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebac1d84 r8:00000002 r7:60000013 r6:ebac1d8c r5:848cc800 r4:848cc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cc800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856449c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510778c r4:85107400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510778c r4:85711f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cc800 r8:85711fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85711f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d5ec2000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:5453 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:5453 tgid:5453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebab1d84 r8:00000002 r7:60000013 r6:ebab1d8c r5:848cd400 r4:848cd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848cd400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644840 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb97d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510738c r4:85107000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510738c r4:8562f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cd400 r8:8562f0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8562f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 Exception stack(0xe0771fb0 to 0xe0771ff8) r4:8497f8c0 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:848ce000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560e040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:848ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579c78c r4:8579c400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579c78c r4:85651400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ce000 r8:8565142c r7:82804d40 r6:dddced40 r5:dddced60 r4:85651400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85651400 r8:8027ed34 r7:eba35e60 r6:85651500 r5:848ce000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac5fb0 to 0xebac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85708100 INFO: task kworker/0:719:5454 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d67ff000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0771dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r5:00001000 r4:dfa99000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:443:5457 blocked for more than 469 seconds. Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:ebac9d84 r8:00000002 r7:60000013 r6:ebac9d8c r5:848cec00 r5:848cec00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644d80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510c38c r4:8510c000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510c38c r4:8562f000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848cec00 r8:8562f02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8562f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f000 r8:8027ed34 r7:ebac1e60 r6:85651580 r5:848cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebac9fb0 to 0xebac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856448c0 INFO: task kworker/1:443:5457 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d6dc5000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:5458 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:5458 tgid:5458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebacdd84 r8:00000002 r7:60000013 r6:ebacdd8c r5:848ca400 r4:848ca400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:848ca400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644b40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9cb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85107b8c r4:85107800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85107b8c r4:8562f100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848ca400 r8:8562f12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8562f100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f100 r8:8027ed34 r7:ebac9e60 r6:85651600 r5:848ca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 r4:85644680 Workqueue: events bpf_prog_free_deferred 1d20: d6dc5000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r4:e0771dc0 r4:00000000 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r5:8501338c r4:85013000 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 r4:847da880 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:445:5461 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:445 state:D stack:0 pid:5461 tgid:5461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebad1d84 r8:00000002 r7:60000113 r6:ebad1d8c r5:84962400 r4:84962400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84962400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644c80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84962400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85107f8c r4:85107c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85107f8c r4:8562f180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84962400 r8:8562f1ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8562f180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f180 r8:8027ed34 r7:ebac9e60 r6:85651680 r5:84962400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad1fb0 to 0xebad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85644900 INFO: task kworker/1:445:5461 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:5463 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:5463 tgid:5463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebaddd84 r8:00000002 r7:60000113 r6:ebaddd8c r5:856d8000 r4:856d8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856d8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebadde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85644ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8510c78c r4:8562f200 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85644c00 INFO: task kworker/1:446:5463 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d79b6000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 r5:856d8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:5467 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:448 state:D stack:0 pid:5467 tgid:5467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebaf5d84 r8:00000002 r7:60000113 r6:ebaf5d8c r5:856d9800 r4:856d9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856d9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85633040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856d9800 r8:8562f32c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8562f300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f300 r8:8027ed34 r7:ebae9e60 r6:85651800 r5:856d9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf5fb0 to 0xebaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85644cc0 INFO: task kworker/1:448:5467 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 1d20: d8334000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:856da400 r5:856da400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:856da400 r8:8562f3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:5472 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:5472 tgid:5472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb1dd84 r8:00000002 r7:60000013 r6:ebb1dd8c r5:856dc800 r4:856dc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856dc800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856335c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb1f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510db8c r4:8510d800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510db8c r4:8562f400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856dc800 r8:8562f42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8562f400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:8501338c r4:85013000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:856dd400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0771d20 to 0xe0771d68) r4:e0771dc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:452:5475 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:452 state:D stack:0 pid:5475 tgid:5475 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb31d84 r8:00000002 r7:60000113 r6:ebb31d8c r5:856db000 r4:856db000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856db000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb31e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85633ac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856db000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb63000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510eb8c r4:8510e800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510eb8c r4:8562f500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856db000 r8:8562f52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8562f500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f500 r8:8027ed34 r7:ebb1de60 r6:85651a00 r5:856db000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb31fb0 to 0xebb31ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:e0771dc0 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:856dbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856dbc00 r8:8562f5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8562f580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f580 r8:8027ed34 r7:ebb31e60 r6:85651a80 r5:856dbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb41fb0 to 0xebb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85633240 INFO: task kworker/1:453:5477 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d9833000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:5479 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:5479 tgid:5479 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb51d84 r8:00000002 r7:60000013 r6:ebb51d8c r5:856e0000 r4:856e0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856e0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85633240 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/1:455:5480 blocked for more than 470 seconds. r5:856e0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85633980 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb53000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510e78c r4:8510e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8510e78c r4:8562f680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e0c00 r8:8562f6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8562f680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f680 r8:8027ed34 r7:ebb31e60 r6:85651b80 r5:856e0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb59fb0 to 0xebb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85633700 INFO: task kworker/1:455:5480 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: d9833000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:856e2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: r5:856e3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85633d80 r5:8510f38c r4:8510f000 r4:8562f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562f780 r8:8027ed34 r7:ebb6de60 r6:85651c80 r5:856e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb71fb0 to 0xebb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856339c0 INFO: task kworker/1:457:5484 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: da79d000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:856e4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb81e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8562f800 r8:8027ed34 r7:ebb71e60 r6:85651d00 r5:856e4800 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85633b00 INFO: task kworker/1:458:5486 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: da79d000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:5490 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:5490 tgid:5490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba61d84 r8:00000002 r7:60000013 r6:eba61d8c r5:856e5400 r5:856e5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:856e6000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:5494 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:5494 tgid:5494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb99d84 r8:00000002 r7:60000013 r6:ebb99d8c r5:856e1800 r4:856e1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856e1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb99e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85618840 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4ed000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579db8c r4:8579d800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8579db8c r4:8562f980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:e0771dc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:856e6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) dfa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:00000001 r4:8497f8c0 Workqueue: events bpf_prog_free_deferred r5:856dec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856182c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ab000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579cb8c r4:8579c800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8579cb8c r4:8562fa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856dec00 r8:8562faac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8562fa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562fa80 r8:8027ed34 r7:ebb99e60 r6:85651f80 r5:856dec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba5fb0 to 0xebba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85633f80 INFO: task kworker/1:463:5497 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: db27e000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:464:5500 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:464 state:D stack:0 pid:5500 tgid:5500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbadd84 r8:00000002 r7:60000113 r6:ebbadd8c r5:856e3c00 r4:856e3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856e3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85618140 INFO: task kworker/1:464:5500 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: db510000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:85756c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85618580 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0771dc0 r5:00001000 r4:dfa99000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:720:5504 blocked for more than 470 seconds. task:kworker/0:720 state:D stack:0 pid:5504 tgid:5504 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb7dd84 r8:00000002 r7:60000113 r6:ebb7dd8c r5:85756000 r4:85756000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85756000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb7de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560ecc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85756000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bbf8c r4:856bbc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856bbf8c r4:85601000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85756000 r8:8560102c r7:82804d40 r6:dddced40 r5:dddced60 r4:85601000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85601000 r8:8027ed34 r7:eba35e60 r6:8562fd00 r5:85756000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb7dfb0 to 0xebb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8560e180 INFO: task kworker/0:720:5504 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: dbaf2000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ebbb5d84 r8:00000002 r7:60000113 r6:ebbb5d8c r5:85754800 r5:85754800 r4:829187f0 r4:00000000 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8562fd80 5fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 r4:e0771dc0 r5:00001000 r4:dfa99000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbb1d84 r8:00000002 r7:60000013 r6:ebbb1d8c r5:85758000 r4:85758000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85758000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85618a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85758000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb529000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579df8c r4:8579dc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8579df8c r4:8562fe80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85758000 r8:8562feac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8562fe80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562fe80 r8:8027ed34 r7:ebb99e60 r6:8562ff00 r5:85758000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb1fb0 to 0xebbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85618640 INFO: task kworker/1:467:5508 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: dbf37000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Not tainted 6.15.0-syzkaller #0 r5:85758c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85618d00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85758c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb753000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579e78c r4:8579e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8579e78c r4:8562ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85758c00 r8:8562ffac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8562ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8562ff80 r8:8027ed34 r7:ebbb1e60 r6:85607000 r5:85758c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb9fb0 to 0xebbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r4:e0771dc0 r5:00001000 r4:dfa99000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:469:5513 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 Call trace: r5:85759800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85759800 r8:856070ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:e0771dc0 r5:00001000 r4:dfa99000 r4:847da880 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:8575a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85618ec0 r10:61c88647 r9:8575a400 r8:856071ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:470:5514 is blocked on a mutex likely owned by task kworker/1:227:3838. [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:5516 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:5516 tgid:5516 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbc5d84 r8:00000002 r7:60000113 r6:ebbc5d8c r5:8575b000 r4:8575b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8575b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85618040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8575b000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579ef8c r4:8579ec00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8579ef8c r4:85607280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575b000 r8:856072ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85607280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85607280 r8:8027ed34 r7:ebbbde60 r6:85607300 r5:8575b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc5fb0 to 0xebbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85618e80 INFO: task kworker/1:471:5516 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: dccdb000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 INFO: task kworker/1:472:5518 blocked for more than 470 seconds. r5:8575bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8575bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb855000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579f38c r4:8579f000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8579f38c r4:85607380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8575bc00 r8:856073ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85607380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85607380 r8:8027ed34 r7:ebbc5e60 r6:85607400 r5:8575bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc9fb0 to 0xebbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85618e80 INFO: task kworker/1:472:5518 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: dccdb000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) INFO: task kworker/1:473:5520 blocked for more than 470 seconds. r5:8575d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8575e000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85607580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85607580 r8:8027ed34 r7:ebbd1e60 r6:85607600 r5:8575e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbd5fb0 to 0xebbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8562e5c0 INFO: task kworker/1:474:5521 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: dd155000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:5524 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:5524 tgid:5524 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbcdd84 r8:00000002 r7:60000013 r6:ebbcdd8c r5:8575ec00 r4:8575ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8575ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbcde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f6540 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8575ec00 r8:856076ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f61c0 INFO: task kworker/1:475:5524 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: dd251000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8575c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfa99000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:85760000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f6680 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85760000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb90f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a838c r4:857a8000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a838c r4:85607880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85760000 r8:856078ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85607880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85607880 r8:8027ed34 r7:ebbdde60 r6:85607900 r5:85760000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe1fb0 to 0xebbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f65c0 INFO: task kworker/1:477:5527 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: dd62e000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:5530 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:5530 tgid:5530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebbe5d84 r8:00000002 r7:60000113 r6:ebbe5d8c r5:85760c00 r4:85760c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85760c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0771fb0 to 0xe0771ff8) Not tainted 6.15.0-syzkaller #0 r5:85761800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a8f8c r4:857a8c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a8f8c r4:85607a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85761800 r8:85607aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85607a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85607a80 r8:8027ed34 r7:ebbdde60 r6:85607b00 r5:85761800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbedfb0 to 0xebbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855f6840 INFO: task kworker/1:479:5532 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: ddde8000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:480:5535 blocked for more than 470 seconds. r5:85762400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc05e08 r9:83018205 r8:85762400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:61c88647 r9:85762400 r8:85607bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85763000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855de040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85763000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc25000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857a9f8c r4:857a9c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857a9f8c r4:85607c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85763000 r8:85607cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855f6a80 Exception stack(0xe0771d20 to 0xe0771d68) 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/1:482:5538 blocked for more than 470 seconds. r4:85763c00 r5:85763c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f6e40 r10:61c88647 r9:85763c00 r8:85607dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:80070013 r4:80239bd0 r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85764800 r5:85764800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc11e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f6fc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85764800 r8:85607eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855de1c0 INFO: task kworker/1:483:5541 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: de6d7000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:484:5542 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:484 state:D stack:0 pid:5542 tgid:5542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc1dd84 r8:00000002 r7:60000013 r6:ebc1dd8c r5:85765400 r4:85765400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85765400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855de5c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85765400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc41000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85607f80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85766000 r5:85766000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: deefd000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:5546 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:5546 tgid:5546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc35d84 r8:00000002 r7:60000113 r6:ebc35d8c r5:857d8000 r4:857d8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857d8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:80070013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r5:8501338c r4:85013000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:487:5549 blocked for more than 470 seconds. r5:857d8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc5d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857aaf8c r4:857aac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857aaf8c r4:8559b280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857d8c00 r8:8559b2ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8559b280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559b280 r8:8027ed34 r7:ebc35e60 r6:8559b300 r5:857d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc49fb0 to 0xebc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855de600 INFO: task kworker/1:487:5549 is blocked on a mutex likely owned by task kworker/1:227:3838. task:kworker/1:227 state:R running task stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: df212000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:5550 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:5550 tgid:5550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc65d84 r8:00000002 r7:60000013 r6:ebc65d8c r5:857d9800 r4:857d9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857d9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855deec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc91000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8559b380 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:489:5552 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:489 state:D stack:0 pid:5552 tgid:5552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc89d84 r8:00000002 r7:60000013 r6:ebc89d8c r5:857db000 r4:857db000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857db000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dea40 r10:61c88647 r9:857db000 r8:8559b4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:855de8c0 Call trace: 1d60: 80070013 ffffffff r4:e0771dc0 r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 task:kworker/1:490 state:D stack:0 pid:5554 tgid:5554 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ebc7d000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ab78c r4:857ab400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8559b580 r10:00000000 r9:8559b580 r8:8027ed34 r7:ebc65e60 r6:8559b600 r5:857dc800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:490:5554 is blocked on a mutex likely owned by task kworker/1:227:3838. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500ec00 r8:80200be4 r7:e0771d54 r6:ffffffff r5:8500ec00 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0771d20 to 0xe0771d68) 1d20: df8be000 df9d7000 00000001 80239bb8 7f84b000 00000001 82ac11c4 82ac05a0 1d40: 7f84b000 df9d7000 8280c9b4 e0771d9c e0771da0 e0771d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0771dc0 r5:e0771e08 r4:e0771dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa99000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501338c r4:85013000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501338c r4:847da880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500ec00 r8:847da8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da880 r8:8027ed34 r7:e06b9e60 r6:847da900 r5:8500ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8497f8c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:491:5555 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:491 state:D stack:0 pid:5555 tgid:5555 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebca1d84 r8:00000002 r7:60000113 r6:ebca1d8c r5:85749800 r4:85749800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85749800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebca1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855de100 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8559b680 r8:8027ed34 r7:ebc65e60 r6:85601080 r5:85749800 Workqueue: events bpf_prog_free_deferred 1d60: 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fac0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8574bc00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8574bc00 r8:8559b72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcadfb0 to 0xebcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855dee80 INFO: task kworker/1:492:5558 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 7fa02000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 900b0013 ffffffff r5:900b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:721:5560 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:721 state:D stack:0 pid:5560 tgid:5560 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebc75d84 r8:00000002 r7:60000113 r6:ebc75d8c r5:8574c800 r4:8574c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8574c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85591680 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8574c800 r8:856011ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:493 state:D stack:0 pid:5561 tgid:5561 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85594040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8574d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b438c r4:857b4000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b438c r4:8559b780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574d400 r8:8559b7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8559b780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559b780 r8:8027ed34 r7:ebcade60 r6:85601280 r5:8574d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc5fb0 to 0xebcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855dee00 INFO: task kworker/1:493:5561 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 7fe06000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 900b0013 ffffffff r5:900b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:5564 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:5564 tgid:5564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcddd84 r8:00000002 r7:60000113 r6:ebcddd8c r5:85748c00 r4:85748c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85748c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcdde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85594700 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85748c00 r7:00000000 r6:83018200 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b538c r4:857b5000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b538c r4:8559b800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85748c00 r8:8559b82c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8559b800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559b800 r8:8027ed34 r7:ebcade60 r6:85601300 r5:85748c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcddfb0 to 0xebcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:900b0013 r4:80239bd0 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:495 state:D stack:0 pid:5566 tgid:5566 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcedd84 r8:00000002 r7:60000113 r6:ebcedd8c r5:8574b000 r4:8574b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8574b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855943c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8574b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcdf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b4b8c r4:857b4800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b4b8c r4:8559b880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574b000 r8:8559b8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8559b880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559b880 r8:8027ed34 r7:ebcdde60 r6:85601380 r5:8574b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcedfb0 to 0xebcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85594300 INFO: task kworker/1:495:5566 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8026f000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:5567 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:857dbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85594580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcef000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b4f8c r4:857b4c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b4f8c r4:8559b900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857dbc00 r8:8559b92c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8559b900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559b900 r8:8027ed34 r7:ebcdde60 r6:8559b980 r5:857dbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc1fb0 to 0xebcc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85594240 INFO: task kworker/1:496:5567 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8026f000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:5570 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:5570 tgid:5570 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebccdd84 r8:00000002 r7:60000113 r6:ebccdd8c r5:857dd400 r4:857dd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857dd400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebccde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85594b00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead27000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b578c r4:857b5400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b578c r4:8559ba00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857dd400 r8:8559ba2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8559ba00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559ba00 r8:8027ed34 r7:ebcdde60 r6:8559ba80 r5:857dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebccdfb0 to 0xebccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85594340 INFO: task kworker/1:497:5570 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 80968000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:5572 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:5572 tgid:5572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba69d84 r8:00000002 r7:60000013 r6:eba69d8c r5:857de000 r4:857de000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857de000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85594c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857de000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b5b8c r4:857b5800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b5b8c r4:8559bb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857de000 r8:8559bb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8559bb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559bb00 r8:8027ed34 r7:ebccde60 r6:8559bb80 r5:857de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba69fb0 to 0xeba69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85594240 INFO: task kworker/1:498:5572 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 80d51000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/1:499:5576 blocked for more than 471 seconds. r5:857e0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa1e08 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b6f8c r4:857b6c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b6f8c r4:8559bc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e0000 r8:8559bc2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8559bc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559bc00 r8:8027ed34 r7:eba69e60 r6:8559bc80 r5:857e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa1fb0 to 0xebaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85594a00 INFO: task kworker/1:499:5576 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 80d51000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 r5:8501378c r4:85013400 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:722:5577 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:722 state:D stack:0 pid:5577 tgid:5577 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebce9d84 r8:00000002 r7:60000013 r6:ebce9d8c r5:8574ec00 r4:8574ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8574ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85591c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8574ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb993000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577038c r4:85770000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:e06b9dc0 r5:00001000 r4:dfacd000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8574a400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:eb0b7000 r7:ddde2d40 r6:83018200 r5:857b5f8c r4:8559bd00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06b9dc0 r4:00000000 r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:5581 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:5581 tgid:5581 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebad9d84 r8:00000002 r7:60000113 r6:ebad9d8c r5:85748000 r4:85748000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85748000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85594f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85748000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb121000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b638c r4:857b6000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b638c r4:8559bd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Workqueue: events bpf_prog_free_deferred r5:800b0013 r4:80239bd0 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:502 state:D stack:0 pid:5582 tgid:5582 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8574e000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855def80 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b678c r4:857b6400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b678c r4:8559be00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8574e000 r8:8559be2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8559be00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559be00 r8:8027ed34 r7:ebaa1e60 r6:85601600 r5:8574e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae5fb0 to 0xebae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85594b40 INFO: task kworker/1:502:5582 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 81167000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856de000 r5:856de000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:857b6b8c r4:8559be80 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:e06b9dc0 r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:504:5587 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:504 state:D stack:0 pid:5587 tgid:5587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb15d84 r8:00000002 r7:60000013 r6:ebb15d8c r5:856e8000 r4:856e8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856e8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85592300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb60b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8559bf00 Exception stack(0xebb15fb0 to 0xebb15ff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 Not tainted 6.15.0-syzkaller #0 r4:856e9800 r5:856e9800 r4:829187f0 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:857b7f8c r4:8559bf80 r4:8559bf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8559bf80 r8:8027ed34 r7:ebb15e60 r6:85601780 r5:856e9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb39fb0 to 0xebb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85592100 INFO: task kworker/1:505:5589 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 81c2d000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:506:5590 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:5590 tgid:5590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eba79d84 r8:00000002 r7:60000113 r6:eba79d8c r5:857e0c00 r4:857e0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857e0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85592440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb661000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b778c r4:857b7400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b778c r4:85586000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e0c00 r8:8558602c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:857e2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855925c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b7b8c r4:857b7800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b7b8c r4:85586100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e2400 r8:8558612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85586100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85586100 r8:8027ed34 r7:ebb39e60 r6:85586180 r5:857e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb49fb0 to 0xebb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855922c0 INFO: task kworker/1:507:5593 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 9d60: 800b0013 ffffffff r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:508 state:D stack:0 pid:5595 tgid:5595 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:857e3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:857b838c r4:85586200 r10:00000000 r9:85586200 r8:8027ed34 r7:ebb39e60 r6:85586280 r5:857e3000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 822a6000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:5598 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:5598 tgid:5598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb5dd84 r8:00000002 r7:60000113 r6:ebb5dd8c r5:857e3c00 r4:857e3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857e3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb5de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85592b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb82b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b8b8c r4:857b8800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b8b8c r4:85586300 r4:00000001 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:510:5599 blocked for more than 471 seconds. r5:857e4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:510:5599 is blocked on a mutex likely owned by task kworker/1:224:3809. r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 829b5000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:511:5602 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:5602 tgid:5602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb79d84 r8:00000002 r7:60000013 r6:ebb79d8c r5:857e5400 r4:857e5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857e5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85576040 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r5:00001000 r4:dfacd000 r4:847da200 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb89d84 r8:00000002 r7:60000113 r6:ebb89d8c r5:857e6000 r4:857e6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857e6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85592cc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb845000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b8f8c r4:857b8c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b8f8c r4:85586600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e6000 r8:8558662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85586600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85586600 r8:8027ed34 r7:ebb79e60 r6:85586680 r5:857e6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb89fb0 to 0xebb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85592b40 INFO: task kworker/1:512:5603 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 82b97000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:513:5606 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:5606 tgid:5606 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcf9d84 r8:00000002 r7:60000113 r6:ebcf9d8c r5:857e6c00 r4:857e6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857e6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85592e80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ad000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b938c r4:857b9000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b938c r4:85586700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e6c00 r8:8558672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85586700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85586700 r8:8027ed34 r7:ebb79e60 r6:85586780 r5:857e6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf9fb0 to 0xebcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85592d00 INFO: task kworker/1:513:5606 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) r5:800b0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r5:8501378c r4:85013400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:514:5607 blocked for more than 471 seconds. [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:857e1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec505e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018205 r8:857e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r5:857b978c r4:857b9400 r7:ddde2d40 r6:83018200 r5:857b978c r4:85586800 r4:85586800 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r4:85592e40 INFO: task kworker/1:514:5607 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 82e3f000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ccb40 task:kworker/1:515 state:D stack:0 pid:5608 tgid:5608 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:857dec00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:eb9eb000 r7:ddde2d40 r6:83018200 r5:857ba38c r4:85586900 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff r4:e06b9dc0 r5:8501378c r4:85013400 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:516:5611 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:516 state:D stack:0 pid:5611 tgid:5611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec511d84 r8:00000002 r7:60000113 r6:ec511d8c r5:857e8c00 r4:857e8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857e8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec511e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855766c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9cd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857b9f8c r4:857b9c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857b9f8c r4:85586a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857e8c00 r8:85586a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85586a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85586a00 r8:8027ed34 r7:ebaf1e60 r6:85586a80 r5:857e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 831db000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:723:5612 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:723 state:D stack:0 pid:5612 tgid:5612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec519d84 r8:00000002 r7:60000113 r6:ec519d8c r5:857ea400 r5:857ea400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec519e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855142c0 r5:00001000 r4:ec619000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85601800 r8:8027ed34 r7:eba35e60 r6:85586b00 r5:857ea400 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:517:5615 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:517 state:D stack:0 pid:5615 tgid:5615 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec51dd84 r8:00000002 r7:60000013 r6:ec51dd8c r5:857e9800 r4:857e9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857e9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85576ac0 r5:857bab8c r4:857ba800 r10:61c88647 r9:857e9800 r8:85586bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 838b8000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:724:5617 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:724 state:D stack:0 pid:5617 tgid:5617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec521d84 r8:00000002 r7:60000113 r6:ec521d8c r5:857e8000 r4:857e8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857e8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec521e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85572100 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85770b8c r4:85770800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85770b8c r4:85601880 r10:61c88647 r9:857e8000 r8:856018ac r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xec521fb0 to 0xec521ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 83a00000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:518:5618 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:518 state:D stack:0 pid:5618 tgid:5618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec525d84 r8:00000002 r7:60000113 r6:ec525d8c r5:857ebc00 r4:857ebc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857ebc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec525e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85576f80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaab000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ba78c r4:857ba400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857ba78c r4:85586d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ebc00 r8:85586d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85586d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85586d00 r8:8027ed34 r7:ec51de60 r6:85586d80 r5:857ebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec525fb0 to 0xec525ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:857ee000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec535e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855722c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba97000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85770f8c r4:85770c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85770f8c r4:85601900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ee000 r8:8560192c r7:82804d40 r6:dddced40 r5:dddced60 r4:85601900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85601900 r8:8027ed34 r7:ec519e60 r6:85586f00 r5:857ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec535fb0 to 0xec535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85572040 INFO: task kworker/0:725:5620 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 83fa8000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:8501378c r4:85013400 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:726:5623 blocked for more than 471 seconds. r5:857eb000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec53de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855721c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4fd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577178c r4:85771400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577178c r4:85601980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857eb000 r8:856019ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85601980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85601980 r8:8027ed34 r7:ec519e60 r6:85586f80 r5:857eb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec53dfb0 to 0xec53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85572140 INFO: task kworker/0:726:5623 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ccb40 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:857eec00 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebb45000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bb78c r4:857bb400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857bb78c r4:8557e000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857eec00 r8:8557e02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557e000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557e000 r8:8027ed34 r7:ec51de60 r6:8557e080 r5:857eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec539fb0 to 0xec539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85576f40 INFO: task kworker/1:519:5626 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 84775000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r5:857ec800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85576140 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb17000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857baf8c r4:857bac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857baf8c r4:8557e100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857ec800 r8:8557e12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557e100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557e100 r8:8027ed34 r7:ec539e60 r6:8557e180 r5:857ec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec509fb0 to 0xec509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85576f40 INFO: task kworker/1:520:5628 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 84775000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:00001000 r4:dfacd000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:521 state:D stack:0 pid:5630 tgid:5630 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:857da400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:857bb38c r4:857bb000 Exception stack(0xec50dfb0 to 0xec50dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85585000 INFO: task kworker/1:521:5630 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 84d3a000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:856ea400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018205 r8:856ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r4:8557e300 Exception stack(0xec545fb0 to 0xec545ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:523:5634 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:523 state:D stack:0 pid:5634 tgid:5634 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec551d84 r8:00000002 r7:60000113 r6:ec551d8c r5:856ec800 r4:856ec800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856ec800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec551e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85585440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb85000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857bbb8c r4:857bb800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857bbb8c r4:8557e380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ec800 r8:8557e3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557e380 r4:00000001 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:524:5636 blocked for more than 471 seconds. task:kworker/1:524 state:D stack:0 pid:5636 tgid:5636 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856ed400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec561e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:856ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 r5:857bbf8c r4:857bbc00 r4:8557e400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:800b0013 r4:80239bd0 r4:e06b9dc0 r4:00000000 r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:525:5637 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:525 state:D stack:0 pid:5637 tgid:5637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec565d84 r8:00000002 r7:60000113 r6:ec565d8c r5:856ee000 r4:856ee000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856ee000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec565e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85585700 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb03000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c838c r4:857c8000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857c838c r4:8557e480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ee000 r8:8557e4ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557e480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557e480 r8:8027ed34 r7:ec545e60 r6:85601b80 r5:856ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec565fb0 to 0xec565ff8) r4:85585400 Call trace: 9d60: 800b0013 ffffffff r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:8501378c r4:85013400 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:526:5640 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:526 state:D stack:0 pid:5640 tgid:5640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebba9d84 r8:00000002 r7:60000013 r6:ebba9d8c r5:856eb000 r4:856eb000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856eb000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85585840 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04e1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c878c r4:857c8400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857c878c r4:8557e500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856eb000 r8:8557e52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557e500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557e500 r8:8027ed34 r7:ec545e60 r6:85601c00 r5:856eb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba9fb0 to 0xebba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85585500 INFO: task kworker/1:526:5640 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 r4:e06b9dc0 r5:8501378c r4:85013400 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:856e8c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85585ac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf33000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c8f8c r4:857c8c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857c8f8c r4:8557e580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856e8c00 r8:8557e5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557e580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557e580 r8:8027ed34 r7:ec545e60 r6:85601c80 r5:856e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd9fb0 to 0xebcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855857c0 INFO: task kworker/1:527:5644 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 85bf0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:528:5645 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:528 state:D stack:0 pid:5645 tgid:5645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebce5d84 r8:00000002 r7:60000013 r6:ebce5d8c r5:85766c00 r4:85766c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85766c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebce5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85585c40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85766c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c938c r4:857c9000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857c938c r4:8557e600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85766c00 r8:8557e62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557e600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557e600 r8:8027ed34 r7:ebcd9e60 r6:85601d00 r5:85766c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebce5fb0 to 0xebce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855857c0 INFO: task kworker/1:528:5645 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 85bf0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:529:5647 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:529 state:D stack:0 pid:5647 tgid:5647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec571d84 r8:00000002 r7:60000013 r6:ec571d8c r5:856eec00 r4:856eec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:856eec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec571e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85585d00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:856eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb283000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c978c r4:857c9400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857c978c r4:8557e680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856eec00 r8:8557e6ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557e680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557e680 r8:8027ed34 r7:ebce5e60 r6:85601d80 r5:856eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec571fb0 to 0xec571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85585bc0 INFO: task kworker/1:529:5647 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 85bf0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:530:5649 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:530 state:D stack:0 pid:5649 tgid:5649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec579d84 r8:00000002 r7:60000013 r6:ec579d8c r5:84a50c00 r4:84a50c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a50c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec579e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85585ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a50c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2fb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c9b8c r4:857c9800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857c9b8c r4:8557e700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a50c00 r8:8557e72c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557e700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 Call trace: 9d60: 800b0013 ffffffff r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:531:5650 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:531 state:D stack:0 pid:5650 tgid:5650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb91d84 r8:00000002 r7:60000113 r6:ebb91d8c r5:857f0c00 r4:857f0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857f0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855614c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb71b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ca78c r4:857ca400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857ca78c r4:8557e780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f0c00 r8:8557e7ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557e780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557e780 r8:8027ed34 r7:ec579e60 r6:8557e800 r5:857f0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb91fb0 to 0xebb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85585b80 INFO: task kworker/1:531:5650 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 86060000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:857f2400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec57de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85576a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb407000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857c9f8c r4:857c9c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857c9f8c r4:8557e880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f2400 r8:8557e8ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557e880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557e880 r8:8027ed34 r7:ebb91e60 r6:8557e900 r5:857f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec57dfb0 to 0xec57dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85585e40 INFO: task kworker/1:532:5653 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 86286000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:727:5656 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:727 state:D stack:0 pid:5656 tgid:5656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec581d84 r8:00000002 r7:60000113 r6:ec581d8c r5:857f3c00 r4:857f3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857f3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec581e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551b8c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc0b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85771b8c r4:85771800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85771b8c r4:85601e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f3c00 r8:85601eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85601e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85601e80 r8:8027ed34 r7:ec519e60 r6:8557ea00 r5:857f3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec581fb0 to 0xec581ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85572340 INFO: task kworker/0:727:5656 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 86781000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:5657 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:5657 tgid:5657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec585d84 r8:00000002 r7:60000113 r6:ec585d8c r5:857f4800 r4:857f4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857f4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec585e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb535000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857ca38c r4:857ca000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857ca38c r4:8557e980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f4800 r8:8557e9ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557e980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557e980 r8:8027ed34 r7:ebb91e60 r6:8557ea80 r5:857f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec585fb0 to 0xec585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85561100 INFO: task kworker/1:533:5657 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 Exception stack(0xe06b9d20 to 0xe06b9d68) r5:800b0013 r4:80239bd0 r4:e06b9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:534:5659 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:534 state:D stack:0 pid:5659 tgid:5659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec589d84 r8:00000002 r7:60000013 r6:ec589d8c r5:84a52400 r4:84a52400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a52400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec589e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561b00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a52400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8fb000 r5:857cbb8c r4:857cb800 r10:61c88647 r9:84a52400 r8:8557eb2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06b9d20 to 0xe06b9d68) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:5660 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:5660 tgid:5660 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec58dd84 r8:00000002 r7:60000113 r6:ec58dd8c r5:84a53000 r4:84a53000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a53000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec58de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561500 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a53000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb785000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cab8c r4:857ca800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857cab8c r4:8557eb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a53000 r8:8557ebac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557eb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557eb80 r8:8027ed34 r7:ec589e60 r6:85601f80 r5:84a53000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec58dfb0 to 0xec58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85561440 INFO: task kworker/1:535:5660 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 86e41000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:536:5663 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:536 state:D stack:0 pid:5663 tgid:5663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec599d84 r8:00000002 r7:60000113 r6:ec599d8c r5:84a54800 r4:84a54800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a54800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561700 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:5664 tgid:5664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec59dd84 r8:00000002 r7:60000013 r6:ec59dd8c r5:84a53c00 r4:84a53c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a53c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec59de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855618c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a53c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb885000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857cb38c r4:857cb000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857cb38c r4:8557ec80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a53c00 r8:8557ecac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8557ec80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8557ec80 r8:8027ed34 r7:ec589e60 r6:8551c080 r5:84a53c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec59dfb0 to 0xec59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85561480 INFO: task kworker/1:537:5664 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:8501378c r4:85013400 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:538 state:D stack:0 pid:5666 tgid:5666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5a5d84 r8:00000002 r7:60000113 r6:ec5a5d8c r5:84a56000 r4:84a56000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a56000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe06b9fb0 to 0xe06b9ff8) task:kworker/1:539 state:D stack:0 pid:5668 tgid:5668 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a55400 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:540:5671 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:540 state:D stack:0 pid:5671 tgid:5671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5b9d84 r8:00000002 r7:60000013 r6:ec5b9d8c r5:84a56c00 r4:84a56c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a56c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec5b9fb0 to 0xec5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85561a80 INFO: task kworker/1:540:5671 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r4:847ccb40 task:kworker/1:541 state:D stack:0 pid:5674 tgid:5674 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:00001000 r4:ebb95000 Exception stack(0xec5c9fb0 to 0xec5c9ff8) Exception stack(0xe06b9d20 to 0xe06b9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 r5:856ebc00 r4:829187f0 r4:00000000 r5:857d078c r4:857d0400 r4:00000001 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:543:5677 blocked for more than 472 seconds. Workqueue: events bpf_prog_free_deferred r5:84a51800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8557ef80 r8:8027ed34 r7:ec5b9e60 r6:8551c380 r5:84a51800 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:5679 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:5679 tgid:5679 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a50000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:857d1f8c r4:857d1c00 r4:85517000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8833a000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:728 state:D stack:0 pid:5681 tgid:5681 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85730000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85771f8c r4:85771c00 r4:8551c480 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06b9d20 to 0xe06b9d68) r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:545:5683 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:545 state:D stack:0 pid:5683 tgid:5683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5c5d84 r8:00000002 r7:60000013 r6:ec5c5d8c r5:85730c00 r4:85730c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85730c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85520040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85730c00 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc3f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d138c r4:857d1000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d138c r4:85517080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85730c00 r8:855170ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85517080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517080 r8:8027ed34 r7:ec549e60 r6:8551c580 r5:85730c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5c5fb0 to 0xec5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85561cc0 INFO: task kworker/1:545:5683 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 88b29000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e06b9dc0 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:546 state:D stack:0 pid:5684 tgid:5684 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85731800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855204c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85731800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc7b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d178c r4:857d1400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d178c r4:85517100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85731800 r8:8551712c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85517100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517100 r8:8027ed34 r7:ec549e60 r6:8551c680 r5:85731800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5d9fb0 to 0xec5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855200c0 INFO: task kworker/1:546:5684 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 88b29000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:729:5685 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:729 state:D stack:0 pid:5685 tgid:5685 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85732400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e5e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85732400 r8:8551c62c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:82ac11e4 r4:e06b9dc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85733000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec575e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551bf00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85733000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc6d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577278c r4:85772400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577278c r4:8551c780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85733000 r8:8551c7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8551c780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551c780 r8:8027ed34 r7:ec519e60 r6:8551c800 r5:85733000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec575fb0 to 0xec575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8551bd00 INFO: task kworker/0:730:5688 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 88e7e000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/0:731:5690 blocked for more than 472 seconds. r5:85733c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855141c0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec5e9fb0 to 0xec5e9ff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 88e7e000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:5693 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:547 state:D stack:0 pid:5693 tgid:5693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5edd84 r8:00000002 r7:60000113 r6:ec5edd8c r5:85734800 r4:85734800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85734800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855205c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85734800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc97000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d1b8c r4:857d1800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d1b8c r4:85517180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85734800 r8:855171ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85517180 r10:00000000 r9:85517180 r8:8027ed34 r7:ec549e60 r6:8551c980 r5:85734800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r5:8501378c r4:85013400 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:548 state:D stack:0 pid:5695 tgid:5695 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85735400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f1e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85520840 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85735400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d238c r4:857d2000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d238c r4:85517200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85735400 r8:8551722c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85517200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517200 r8:8027ed34 r7:ec549e60 r6:8551ca00 r5:85735400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f1fb0 to 0xec5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85520580 INFO: task kworker/1:548:5695 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 897f1000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:549:5697 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:549 state:D stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5f5d84 r8:00000002 r7:60000113 r6:ec5f5d8c r5:85736000 r4:85736000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85736000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85520ac0 r9:83018205 r8:85736000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85736000 r8:855172ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r4:855206c0 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 899a3000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:5699 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:5699 tgid:5699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec5f9d84 r8:00000002 r7:60000013 r6:ec5f9d8c r5:85736c00 r4:85736c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85736c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857d278c r4:857d2400 r7:ddde2d40 r6:83018200 r5:857d278c r4:85517300 r10:00000000 r9:85517300 r8:8027ed34 r7:ec5f5e60 r6:8551cb00 r5:85736c00 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r5:800b0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:551:5701 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:551 state:D stack:0 pid:5701 tgid:5701 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec605d84 r8:00000002 r7:60000013 r6:ec605d8c r5:84ae8000 r4:84ae8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec605e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85574480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ae8000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d3f8c r4:857d3c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d3f8c r4:85517380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae8000 r8:855173ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85517380 r10:00000000 r9:85517380 r8:8027ed34 r7:ec5f5e60 r6:8551cb80 r5:84ae8000 r4:85520940 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 89d32000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:84ae8c00 r5:84ae8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec611e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85520c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ae8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec601000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d2f8c r4:857d2c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d2f8c r4:85517400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae8c00 r8:8551742c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85517400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517400 r8:8027ed34 r7:ec605e60 r6:8551cc00 r5:84ae8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec611fb0 to 0xec611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85520b40 INFO: task kworker/1:552:5702 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8a22f000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:ec5ddd84 r8:00000002 r7:60000013 r6:ec5ddd8c r5:84ae9800 r5:84ae9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:857d338c r4:857d3000 r10:00000000 r9:85517480 r8:8027ed34 r7:ec605e60 r6:8551cc80 r5:84ae9800 INFO: task kworker/1:553:5705 is blocked on a mutex likely owned by task kworker/1:224:3809. r5:800b0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:732:5707 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:732 state:D stack:0 pid:5707 tgid:5707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec61dd84 r8:00000002 r7:60000013 r6:ec61dd8c r5:84aea400 r4:84aea400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aea400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec61de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855147c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84aea400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85773b8c r4:85773800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85773b8c r4:8551cd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aea400 r8:8551cd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8551cd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r5:00001000 r4:dfacd000 r5:8501378c r4:85013400 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:733 state:D stack:0 pid:5708 tgid:5708 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84aeb000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85514740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84aeb000 r7:00000000 r6:83018000 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0729000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577378c r4:85773400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577378c r4:8551ce00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aeb000 r8:8551ce2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8551ce00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551ce00 r8:8027ed34 r7:ec61de60 r6:8551ce80 r5:84aeb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec64dfb0 to 0xec64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855140c0 INFO: task kworker/0:733:5708 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8abd4000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:554:5710 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:554 state:D stack:0 pid:5710 tgid:5710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec651d84 r8:00000002 r7:60000113 r6:ec651d8c r5:84aebc00 r4:84aebc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aebc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec651e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85520bc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84aebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec653000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d378c r4:857d3400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d378c r4:85517500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aebc00 r8:8551752c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85517500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517500 r8:8027ed34 r7:ec605e60 r6:8551cf00 r5:84aebc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec651fb0 to 0xec651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85520d00 Call trace: r5:800b0013 r4:80239bd0 r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) Not tainted 6.15.0-syzkaller #0 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aec800 r4:829187f0 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85514b40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84aec800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ef000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:83ea1f8c r4:83ea1c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:83ea1f8c r4:8551cf80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aec800 r8:8551cfac r7:82804d40 r6:dddced40 r5:dddced60 r4:8551cf80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551cf80 r8:8027ed34 r7:ec61de60 r6:85562000 r5:84aec800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec62dfb0 to 0xec62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85514700 INFO: task kworker/0:734:5715 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8b0a4000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8501378c r4:85013400 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:84aed400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85514980 r5:85773f8c r4:85773c00 r10:61c88647 r9:84aed400 r8:855620ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 Exception stack(0xec559fb0 to 0xec559ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) 9d60: 800b0013 ffffffff r4:e06b9dc0 r4:00000000 r5:8501378c r4:85013400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:736:5719 blocked for more than 472 seconds. r4:84aee000 r5:84aee000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec56de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556a700 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84aee000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb833000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85788f8c r4:85788c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85788f8c r4:85562180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aee000 r8:855621ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85562180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562180 r8:8027ed34 r7:ec62de60 r6:85562200 r5:84aee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec56dfb0 to 0xec56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85514c40 INFO: task kworker/0:736:5719 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8b309000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:737:5721 blocked for more than 472 seconds. Workqueue: events bpf_prog_free_deferred r5:84aeec00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:84aeec00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 r4:85562280 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 r4:00000001 r4:847ccb40 Workqueue: events bpf_prog_free_deferred r5:85810c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebafde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85514e80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85810c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb261000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578838c r4:85788000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578838c r4:85562380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85810c00 r8:855623ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85562380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562380 r8:8027ed34 r7:ec56de60 r6:85562400 r5:85810c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebafdfb0 to 0xebafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85514d00 INFO: task kworker/0:738:5723 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8b90c000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:555:5724 blocked for more than 472 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85811800 r5:85811800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85574340 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85811800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb65f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d3b8c r4:857d3800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d3b8c r4:85517580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85811800 r8:855175ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85517580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517580 r8:8027ed34 r7:ec605e60 r6:85562480 r5:85811800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec665fb0 to 0xec665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85574100 INFO: task kworker/1:555:5724 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8bd68000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 Workqueue: events bpf_prog_free_deferred r5:85812400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:00001000 r4:eb491000 r10:61c88647 r9:85812400 r8:8556252c r7:82804d40 r6:dddced40 r5:dddced60 r4:849dce40 Call trace: r5:800b0013 r4:80239bd0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8501378c r4:85013400 Exception stack(0xe06b9fb0 to 0xe06b9ff8) Workqueue: events bpf_prog_free_deferred r5:85813c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec66de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556a540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85813c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb715000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85788b8c r4:85788800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85788b8c r4:85562600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85813c00 r8:8556262c r7:82804d40 r6:dddced40 r5:dddced60 r4:85562600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562600 r8:8027ed34 r7:ec56de60 r6:85562680 r5:85813c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec66dfb0 to 0xec66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r4:e06b9dc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85813000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec679e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855746c0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:8501378c r4:85013400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:857f3000 r5:857f3000 r4:829187f0 r4:00000000 r5:00001000 r4:eb80b000 r4:85517680 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:82ac11e4 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:857f6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857f6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec675e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85574780 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb92f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d478c r4:857d4400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:857d478c r4:85562780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f6c00 r8:855627ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85562780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562780 r8:8027ed34 r7:ec56de60 r6:85517780 r5:857f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec675fb0 to 0xec675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8556a580 INFO: task kworker/0:741:5734 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 9d20: 8d1d2000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847ccb40 r5:857f6000 r4:829187f0 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8d211000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:857f1800 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:00000000 r9:85517880 r8:8027ed34 r7:ec679e60 r6:85517900 r5:857f1800 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:743:5740 blocked for more than 472 seconds. r5:857f0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec68de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556a980 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb973000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578978c r4:85789400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578978c r4:85562880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f0000 r8:855628ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85562880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562880 r8:8027ed34 r7:ec675e60 r6:85517980 r5:857f0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec68dfb0 to 0xec68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:e06b9dc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847ccb40 r10:829187f4 r9:ec695d84 r8:00000002 r7:60000113 r6:ec695d8c r5:857f8c00 r5:857f8c00 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:61c88647 r9:857f8c00 r8:8556292c r7:82804d40 r6:dddced40 r5:dddced60 Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:847da200 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:857f9800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556ab00 r10:61c88647 r9:857f9800 r8:855629ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8556a6c0 INFO: task kworker/0:745:5743 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8e029000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:857f8000 r5:857f8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556ac80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9bd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85789f8c r4:85789c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85789f8c r4:85562a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857f8000 r8:85562a2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85562a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562a00 r8:8027ed34 r7:ec695e60 r6:85517b00 r5:857f8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a1fb0 to 0xec6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8556abc0 INFO: task kworker/0:746:5745 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r4:e06b9dc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:857fa400 r5:857fa400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6a9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556adc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ed000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578a38c r4:8578a000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578a38c r4:85562a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fa400 r8:85562aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85562a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562a80 r8:8027ed34 r7:ec695e60 r6:85517b80 r5:857fa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6a9fb0 to 0xec6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8556aa80 INFO: task kworker/0:747:5747 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8e76b000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8501378c r4:85013400 Exception stack(0xe06b9fb0 to 0xe06b9ff8) Not tainted 6.15.0-syzkaller #0 r5:857fb000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556af00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578a78c r4:8578a400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578a78c r4:85562b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fb000 r8:85562b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85562b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562b00 r8:8027ed34 r7:ec695e60 r6:85517c00 r5:857fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b1fb0 to 0xec6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8556ac40 Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff r4:82ac11e4 r4:e06b9dc0 r4:00000000 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:559:5751 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:559 state:D stack:0 pid:5751 tgid:5751 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec6b5d84 r8:00000002 r7:60000113 r6:ec6b5d8c r5:857fbc00 r4:857fbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857fbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558a540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:857fbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec501000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578bb8c r4:8578b800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8578bb8c r4:85517c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fbc00 r8:85517cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85517c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85517c80 r8:8027ed34 r7:ec689e60 r6:85517d00 r5:857fbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b5fb0 to 0xec6b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 9d60: 800b0013 ffffffff r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:749 state:D stack:0 pid:5753 tgid:5753 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:857fc800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8556a480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578ab8c r4:8578a800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578ab8c r4:85562b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fc800 r8:85562bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85562b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562b80 r8:8027ed34 r7:ec695e60 r6:85517d80 r5:857fc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c5fb0 to 0xec6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8556af80 INFO: task kworker/0:749:5753 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8ec15000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:750:5755 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:750 state:D stack:0 pid:5755 tgid:5755 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec6cdd84 r8:00000002 r7:60000013 r6:ec6cdd8c r5:857fd400 r4:857fd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857fd400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855740c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:857fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb11000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578af8c r4:8578ac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578af8c r4:85562c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fd400 r8:85562c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85562c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562c00 r8:8027ed34 r7:ec695e60 r6:85517e00 r5:857fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6cdfb0 to 0xec6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8556aec0 INFO: task kworker/0:750:5755 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8f089000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:751:5758 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:751 state:D stack:0 pid:5758 tgid:5758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec6d9d84 r8:00000002 r7:60000113 r6:ec6d9d8c r5:857fe000 r4:857fe000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:857fe000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855879c0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85562c80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855871c0 INFO: task kworker/0:751:5758 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 8f6a1000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:857f5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85587140 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:753:5761 blocked for more than 473 seconds. r5:85800c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85587600 r10:61c88647 r9:85800c00 r8:85562dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85587100 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:754:5764 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:754 state:D stack:0 pid:5764 tgid:5764 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec711d84 r8:00000002 r7:60000113 r6:ec711d8c r5:85801800 r4:85801800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85801800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec711e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85587740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85801800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec569000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578c38c r4:8578c000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578c38c r4:85562e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85801800 r8:85562e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85562e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562e00 r8:8027ed34 r7:ec6d9e60 r6:8559a000 r5:85801800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec711fb0 to 0xec711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85587680 INFO: task kworker/0:754:5764 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9015a000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:755:5766 blocked for more than 473 seconds. r4:85800000 r5:85800000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578c78c r4:8578c400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578c78c r4:85562e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85800000 r8:85562eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85562e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562e80 r8:8027ed34 r7:ec6d9e60 r6:8559a080 r5:85800000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec71dfb0 to 0xec71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:855875c0 INFO: task kworker/0:755:5766 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 908b4000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Call trace: r5:85803000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84420d40 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec721fb0 to 0xec721ff8) r4:8558a880 r4:00000000 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:756 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec73dd84 r8:00000002 r7:60000113 r6:ec73dd8c r5:85802400 r4:85802400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85802400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec73de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85574580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85802400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0097000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578e38c r4:8578e000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578e38c r4:85562f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85802400 r8:85562f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85562f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562f00 r8:8027ed34 r7:ec6d9e60 r6:8559a200 r5:85802400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec73dfb0 to 0xec73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85587700 INFO: task kworker/0:756:5769 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 90dc9000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe06b9fb0 to 0xe06b9ff8) r4:847ccb40 task:kworker/0:757 state:D stack:0 pid:5771 tgid:5771 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85805400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ec739000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:8578cf8c r4:85562f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85805400 r8:85562fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85562f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85562f80 r8:8027ed34 r7:ec73de60 r6:8559a280 r5:85805400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec745fb0 to 0xec745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85587840 INFO: task kworker/0:757:5771 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 911f8000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:758:5773 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:758 state:D stack:0 pid:5773 tgid:5773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec755d84 r8:00000002 r7:60000113 r6:ec755d8c r5:85806000 r4:85806000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85806000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec755e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85587c80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85806000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec74d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578d38c r4:8578d000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578d38c r4:855da000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85806000 r8:855da02c r7:82804d40 r6:dddced40 r5:dddced60 r4:855da000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855da000 r8:8027ed34 r7:ec73de60 r6:8559a300 r5:85806000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec755fb0 to 0xec755ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Call trace: r5:85803c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85587d40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85803c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec75d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578d78c r4:8578d400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578d78c r4:855da080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85803c00 r8:855da0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855da080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855da080 r8:8027ed34 r7:ec73de60 r6:8559a380 r5:85803c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec76dfb0 to 0xec76dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85587c40 INFO: task kworker/0:759:5775 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 919be000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8501378c r4:85013400 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:760:5777 blocked for more than 473 seconds. r5:85804800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d20: 91c65000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ec6c9d84 r8:00000002 r7:60000013 r6:ec6c9d8c r5:85815400 r5:85815400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855872c0 r7:dddced40 r6:83018000 r5:8578df8c r4:855da100 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6c9fb0 to 0xec6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85587cc0 INFO: task kworker/0:761:5779 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 921e3000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:762:5782 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:762 state:D stack:0 pid:5782 tgid:5782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebcf5d84 r8:00000002 r7:60000113 r6:ebcf5d8c r5:85816000 r4:85816000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85816000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85620040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85816000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf97000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578eb8c r4:8578e800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578eb8c r4:855da280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85816000 r8:855da2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855da280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855da280 r8:8027ed34 r7:ec73de60 r6:855da300 r5:85816000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf5fb0 to 0xebcf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85587fc0 INFO: task kworker/0:762:5782 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 921e3000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:763:5783 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:763 state:D stack:0 pid:5783 tgid:5783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec681d84 r8:00000002 r7:60000113 r6:ec681d8c r5:85816c00 r4:85816c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85816c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec681e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:85514dc0 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/0:764:5787 blocked for more than 473 seconds. r5:85814800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec659fb0 to 0xec659ff8) r4:856201c0 Workqueue: events bpf_prog_free_deferred r5:800b0013 r4:80239bd0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06b9fb0 to 0xe06b9ff8) Not tainted 6.15.0-syzkaller #0 r5:85810000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856205c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85810000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4df000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578f78c r4:8578f400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578f78c r4:855da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85810000 r8:855da5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855da580 r8:8027ed34 r7:ec659e60 r6:855da600 r5:85810000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec785fb0 to 0xec785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85620100 INFO: task kworker/0:765:5788 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 927f1000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ec789d84 r8:00000002 r7:60000013 r6:ec789d8c r5:85828000 r5:85828000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec789e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:855da680 r8:8027ed34 r7:ec785e60 r6:855da700 r5:85828000 r4:85620300 Call trace: r5:800b0013 r4:80239bd0 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:767 state:D stack:0 pid:5792 tgid:5792 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85829800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85620b40 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 r4:85620440 INFO: task kworker/0:767:5792 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 929e0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:768:5794 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:768 state:D stack:0 pid:5794 tgid:5794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec791d84 r8:00000002 r7:60000113 r6:ec791d8c r5:8582b000 r4:8582b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8582b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec791e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85620800 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8582b000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb533000 r7:dddced40 r6:83018000 r5:8578fb8c r4:855da880 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:769 state:D stack:0 pid:5796 tgid:5796 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a41800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec799e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85620a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a41800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb75f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8578ff8c r4:8578fc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8578ff8c r4:855da980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a41800 r8:855da9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:855da980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855da980 r8:8027ed34 r7:ec781e60 r6:8559a480 r5:84a41800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec799fb0 to 0xec799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85620880 INFO: task kworker/0:769:5796 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 92d0a000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a43000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855daa00 r8:8027ed34 r7:ec781e60 r6:8559a500 r5:84a43000 r4:856209c0 r4:00000000 9d60: 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r5:8501378c r4:85013400 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:847ccb40 Workqueue: events bpf_prog_free_deferred r5:84a44800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb883000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579478c r4:85794400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579478c r4:855daa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a44800 r8:855daaac r7:82804d40 r6:dddced40 r5:dddced60 r4:855daa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855daa80 r8:8027ed34 r7:ec7a1e60 r6:8559a580 r5:84a44800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7adfb0 to 0xec7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85620b00 INFO: task kworker/0:771:5801 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9323b000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a42400 r5:84a42400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85620d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800b0013 r4:80239bd0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8501378c r4:85013400 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 Not tainted 6.15.0-syzkaller #0 r4:84a45400 r5:84a45400 r4:829187f0 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xec7b9fb0 to 0xec7b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85620f40 INFO: task kworker/0:773:5804 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9399c000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:774:5805 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:774 state:D stack:0 pid:5805 tgid:5805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec7bdd84 r8:00000002 r7:60000013 r6:ec7bdd8c r5:84a40c00 r4:84a40c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a40c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7bde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xec7bdfb0 to 0xec7bdff8) Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84a43c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 9d20: 93cc7000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:776:5809 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:776 state:D stack:0 pid:5809 tgid:5809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec7cdd84 r8:00000002 r7:60000113 r6:ec7cdd8c r5:84a40000 r4:84a40000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a40000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca240 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a40000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc29000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579638c r4:85796000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579638c r4:855dad00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a40000 r8:855dad2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xec7cdfb0 to 0xec7cdff8) Workqueue: events bpf_prog_free_deferred r5:800b0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/0:777:5811 blocked for more than 473 seconds. r5:84a46c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a46c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc17000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85795f8c r4:85795c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85795f8c r4:855dad80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a46c00 r8:855dadac r7:82804d40 r6:dddced40 r5:dddced60 r4:855dad80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855dad80 r8:8027ed34 r7:ec7cde60 r6:8559a880 r5:84a46c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7d5fb0 to 0xec7d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ca0c0 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/0:778:5813 blocked for more than 473 seconds. r4:84a46000 r5:84a46000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7dde08 r9:83018005 r8:84a46000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r10:61c88647 r9:84a46000 r8:855dae2c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:779 state:D stack:0 pid:5815 tgid:5815 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85806c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85806c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85806c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc59000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85796b8c r4:85796800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85796b8c r4:855dae80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85806c00 r8:855daeac r7:82804d40 r6:dddced40 r5:dddced60 r4:855dae80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855dae80 r8:8027ed34 r7:ec7dde60 r6:8559a980 r5:85806c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7e5fb0 to 0xec7e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ca140 INFO: task kworker/0:779:5815 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 941aa000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:780:5817 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:780 state:D stack:0 pid:5817 tgid:5817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec7edd84 r8:00000002 r7:60000013 r6:ec7edd8c r5:85808c00 r4:85808c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85808c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca880 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85808c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579778c r4:85797400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579778c r4:855daf00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85808c00 r8:855daf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:855daf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855daf00 r8:8027ed34 r7:ec7e5e60 r6:8559aa00 r5:85808c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7edfb0 to 0xec7edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06b9d20 to 0xe06b9d68) r4:82ac11e4 r4:e06b9dc0 r4:00000000 r5:00001000 r4:dfacd000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:781:5819 blocked for more than 473 seconds. r10:829187f4 r9:ec78dd84 r8:00000002 r7:60000113 r6:ec78dd8c r5:85828c00 r5:85828c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebc8f000 r5:8579738c r4:85797000 r10:61c88647 r9:85828c00 r8:855dafac r7:82804d40 r6:dddced40 r5:dddced60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800b0013 r4:80239bd0 r4:e06b9dc0 r4:00000000 r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:782:5823 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:782 state:D stack:0 pid:5823 tgid:5823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec7f1d84 r8:00000002 r7:60000113 r6:ec7f1d8c r5:8582bc00 r4:8582bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8582bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cabc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8582bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85797f8c r4:85797c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85797f8c r4:8519f080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582bc00 r8:8519f0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f080 r8:8027ed34 r7:ec7ede60 r6:8519f100 r5:8582bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f1fb0 to 0xec7f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851ca680 INFO: task kworker/0:782:5823 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 94e55000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:783:5824 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:783 state:D stack:0 pid:5824 tgid:5824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec795d84 r8:00000002 r7:60000113 r6:ec795d8c r5:8582c800 r4:8582c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8582c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec795e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca9c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8582c800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcc7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85797b8c r4:85797800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85797b8c r4:8519f180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582c800 r8:8519f1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 800b0013 ffffffff r4:e06b9dc0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847da200 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8582d400 r5:8582d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7f9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cae40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8582d400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec59f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579878c r4:85798400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579878c r4:8519f300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582d400 r8:8519f32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f300 r8:8027ed34 r7:ec7f1e60 r6:8519f280 r5:8582d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec7f9fb0 to 0xec7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851caa40 INFO: task kworker/0:784:5827 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 95481000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:785 state:D stack:0 pid:5829 tgid:5829 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8582e000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec801e08 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8582e000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec55b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579838c r4:85798000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579838c r4:8519f380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8582e000 r8:8519f3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f380 r8:8027ed34 r7:ec7f9e60 r6:8519f400 r5:8582e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec801fb0 to 0xec801ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851caac0 INFO: task kworker/0:785:5829 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9566a000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:786:5831 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:786 state:D stack:0 pid:5831 tgid:5831 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8582ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8519f480 r8:8027ed34 r7:ec7f9e60 r6:8519f500 r5:8582ec00 Workqueue: events bpf_prog_free_deferred r5:800b0013 r4:80239bd0 r4:e06b9dc0 r5:00001000 r4:dfacd000 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:ec809d84 r8:00000002 r7:60000013 r6:ec809d8c r5:8582a400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800b0013 r4:80239bd0 r4:00000000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84a78000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a78000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec80de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a78000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec623000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579978c r4:85799400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579978c r4:8519f680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a78000 r8:8519f6ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f680 r8:8027ed34 r7:ec809e60 r6:8519f700 r5:84a78000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec80dfb0 to 0xec80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:788:5835 is blocked on a mutex likely owned by task kworker/1:224:3809. 9d60: 800b0013 ffffffff r4:e06b9dc0 r4:00000000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 INFO: task kworker/0:789:5837 blocked for more than 474 seconds. r5:84a78c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec811e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a78c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec60b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579938c r4:85799000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579938c r4:8519f780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a78c00 r8:8519f7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519f780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519f780 r8:8027ed34 r7:ec80de60 r6:8519f800 r5:84a78c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec811fb0 to 0xec811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d1100 INFO: task kworker/0:789:5837 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9631e000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:790:5839 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:790 state:D stack:0 pid:5839 tgid:5839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec815d84 r8:00000002 r7:60000113 r6:ec815d8c r5:84a79800 r4:84a79800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a79800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec815e08 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85799b8c r4:8519f880 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:791 state:D stack:0 pid:5841 tgid:5841 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a7a400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec819e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a7a400 r8:8519f9ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:8519f980 r8:8027ed34 r7:ec815e60 r6:8519fa00 r5:84a7a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec819fb0 to 0xec819ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d14c0 INFO: task kworker/0:791:5841 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 96ed6000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a7b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec81de08 r9:83018005 r8:84a7b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 r5:00001000 r4:ec82b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579a38c r4:8579a000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579a38c r4:8519fa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a7b000 r8:8519faac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fa80 r8:8027ed34 r7:ec819e60 r6:8519fb00 r5:84a7b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec81dfb0 to 0xec81dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d1600 INFO: task kworker/0:792:5843 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 97805000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a7bc00 r5:84a7bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:84a7bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 r4:8519fb80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:800b0013 r4:80239bd0 r4:e06b9dc0 r5:00001000 r4:dfacd000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/0:794:5847 blocked for more than 474 seconds. r5:84a7c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec835e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d1a40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a7c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec84f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579af8c r4:8579ac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579af8c r4:8519fc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a7c800 r8:8519fcac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519fc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519fc80 r8:8027ed34 r7:ec829e60 r6:8519fd00 r5:84a7c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec835fb0 to 0xec835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d1900 INFO: task kworker/0:794:5847 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 986e7000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84a7d400 r5:84a7d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:8579ab8c r4:8579a800 r4:8519fd80 1fa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84a7e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:84a7e000 r8:8519feac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:797:5853 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:797 state:D stack:0 pid:5853 tgid:5853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec859d84 r8:00000002 r7:60000113 r6:ec859d8c r5:84a7ec00 r4:84a7ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a7ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec859e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85620f80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a7ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec867000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579b78c r4:8579b400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579b78c r4:8519ff80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a7ec00 r8:8519ffac r7:82804d40 r6:dddced40 r5:dddced60 r4:8519ff80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8519ff80 r8:8027ed34 r7:ec84de60 r6:85603000 r5:84a7ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec859fb0 to 0xec859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847d1d40 INFO: task kworker/0:797:5853 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:00000000 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:798 state:D stack:0 pid:5856 tgid:5856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec865d84 r8:00000002 r7:60000113 r6:ec865d8c r5:85830000 r4:85830000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85830000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec865e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85613040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85830000 r7:00000000 r6:83018000 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb4f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8579bb8c r4:8579b800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8579bb8c r4:85603080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85830000 r8:856030ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603080 r8:8027ed34 r7:ec859e60 r6:85603100 r5:85830000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec865fb0 to 0xec865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85613080 INFO: task kworker/0:798:5856 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 996b3000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:799:5858 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:799 state:D stack:0 pid:5858 tgid:5858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ebb25d84 r8:00000002 r7:60000113 r6:ebb25d8c r5:85830c00 r5:85830c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 INFO: task kworker/0:800:5859 blocked for more than 474 seconds. r5:85831800 r4:829187f0 r9:83018005 r8:85831800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85613240 INFO: task kworker/0:800:5859 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 99c9a000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:801:5861 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:801 state:D stack:0 pid:5861 tgid:5861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec6b9d84 r8:00000002 r7:60000013 r6:ec6b9d8c r5:85832400 r4:85832400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85832400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85613680 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85832400 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b478c r4:858b4400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b478c r4:85603380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85832400 r8:856033ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603380 r8:8027ed34 r7:ec7fde60 r6:85603400 r5:85832400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6b9fb0 to 0xec6b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:856133c0 INFO: task kworker/0:801:5861 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9a000000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 Exception stack(0xe06b9fb0 to 0xe06b9ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85833000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:858b4b8c r4:858b4800 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r4:00000000 r5:8501378c r4:85013400 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:803:5865 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:803 state:D stack:0 pid:5865 tgid:5865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec875d84 r8:00000002 r7:60000113 r6:ec875d8c r5:85835400 r4:85835400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85835400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec875e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85613b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85835400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb273000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b4f8c r4:858b4c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b4f8c r4:85603580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85835400 r8:856035ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603580 r8:8027ed34 r7:ec761e60 r6:85603600 r5:85835400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec875fb0 to 0xec875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85613780 INFO: task kworker/0:803:5865 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9a2c2000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:00001000 r4:dfacd000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829187f4 r9:ec879d84 r8:00000002 r7:60000013 r6:ec879d8c r5:85834800 r5:85834800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec879e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85613d40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85834800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb655000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b538c r4:858b5000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b538c r4:85603680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85834800 r8:856036ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603680 r8:8027ed34 r7:ec875e60 r6:85603700 r5:85834800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec879fb0 to 0xec879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85613a00 INFO: task kworker/0:804:5867 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9a634000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:805:5869 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:805 state:D stack:0 pid:5869 tgid:5869 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85809800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018005 r8:85809800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec881fb0 to 0xec881ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85613bc0 INFO: task kworker/0:805:5869 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9a634000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:8580a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec889e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85613e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580a400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6eb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b578c r4:858b5400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b578c r4:85603800 r10:61c88647 r9:8580a400 r8:8560382c r7:82804d40 r6:dddced40 r5:dddced60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8580b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:858b5f8c r4:858b5c00 r4:85603880 Exception stack(0xec895fb0 to 0xec895ff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:808:5875 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:808 state:D stack:0 pid:5875 tgid:5875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec899d84 r8:00000002 r7:60000013 r6:ec899d8c r5:8580d400 r4:8580d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8580d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec899e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a04340 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580d400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb94b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b678c r4:858b6400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b678c r4:85603900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580d400 r8:8560392c r7:82804d40 r6:dddced40 r5:dddced60 r4:85603900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603900 r8:8027ed34 r7:ec895e60 r6:8559ac00 r5:8580d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec899fb0 to 0xec899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85613e00 INFO: task kworker/0:808:5875 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9ac54000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:809:5876 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred r4:8580bc00 r5:8580bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:858b638c r4:858b6000 r10:00000000 r9:85603a00 r8:8027ed34 r7:ec899e60 r6:8559ac80 r5:8580bc00 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9ac54000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:810:5879 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:810 state:D stack:0 pid:5879 tgid:5879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8a5d84 r8:00000002 r7:60000113 r6:ec8a5d8c r5:8580ec00 r5:8580ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8a5e08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:8580ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8580ec00 r8:856039ac r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 Exception stack(0xec8a5fb0 to 0xec8a5ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r5:00001000 r4:dfacd000 r5:8501378c r4:85013400 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:8580c800 r5:8580c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a04480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580c800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb995000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b6b8c r4:858b6800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b6b8c r4:85603a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580c800 r8:85603aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603a80 r8:8027ed34 r7:ec8a5e60 r6:8559ad80 r5:8580c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8a9fb0 to 0xec8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a04300 INFO: task kworker/0:811:5880 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9b03e000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:812:5882 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:812 state:D stack:0 pid:5882 tgid:5882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8b1d84 r8:00000002 r7:60000013 r6:ec8b1d8c r5:8580e000 r4:8580e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8580e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a045c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8580e000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9cf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b6f8c r4:858b6c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b6f8c r4:85603b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8580e000 r8:85603b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85603b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603b00 r8:8027ed34 r7:ec8a5e60 r6:8559ae00 r5:8580e000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800b0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:813 state:D stack:0 pid:5884 tgid:5884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8b9d84 r8:00000002 r7:60000013 r6:ec8b9d8c r5:85808000 r4:85808000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85808000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a04700 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85808000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b738c r4:858b7000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b738c r4:85603b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85808000 r8:85603bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603b80 r8:8027ed34 r7:ec8a5e60 r6:8559ae80 r5:85808000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8b9fb0 to 0xec8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a04440 INFO: task kworker/0:813:5884 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9b936000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:ec8c1d84 r8:00000002 r7:60000113 r6:ec8c1d8c r5:85870c00 r5:85870c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85870000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:858b7b8c r4:85603c80 Exception stack(0xec8c9fb0 to 0xec8c9ff8) INFO: task kworker/0:815:5888 is blocked on a mutex likely owned by task kworker/1:224:3809. 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:816:5890 blocked for more than 474 seconds. task:kworker/0:816 state:D stack:0 pid:5890 tgid:5890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8d1d84 r8:00000002 r7:60000013 r6:ec8d1d8c r5:85871800 r4:85871800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85871800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a04a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85871800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb21000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b7f8c r4:858b7c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b7f8c r4:85603d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85871800 r8:85603d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85603d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603d00 r8:8027ed34 r7:ec8a5e60 r6:851c5000 r5:85871800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d1fb0 to 0xec8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a049c0 INFO: task kworker/0:816:5890 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9bc83000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:817:5893 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:817 state:D stack:0 pid:5893 tgid:5893 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8ddd84 r8:00000002 r7:60000113 r6:ec8ddd8c r5:85873c00 r4:85873c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85873c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a04c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85873c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb55000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b838c r4:858b8000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b838c r4:85603d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85873c00 r8:85603dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603d80 r8:8027ed34 r7:ec8a5e60 r6:851c5080 r5:85873c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8ddfb0 to 0xec8ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a04880 INFO: task kworker/0:817:5893 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9bc83000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:818:5894 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:818 state:D stack:0 pid:5894 tgid:5894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8e1d84 r8:00000002 r7:60000113 r6:ec8e1d8c r5:85874800 r4:85874800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85874800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a04d80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85874800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec513000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b878c r4:858b8400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b878c r4:85603e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85874800 r8:85603e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85603e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603e00 r8:8027ed34 r7:ec8a5e60 r6:851c5100 r5:85874800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e1fb0 to 0xec8e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a04a00 INFO: task kworker/0:818:5894 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9bc83000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:819:5897 blocked for more than 474 seconds. r5:85872400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a04e80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85872400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec54d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b8b8c r4:858b8800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b8b8c r4:85603e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85872400 r8:85603eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85603e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85603e80 r8:8027ed34 r7:ec8a5e60 r6:851c5180 r5:85872400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8edfb0 to 0xec8edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a04b80 INFO: task kworker/0:819:5897 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9c10f000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85873000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8f1e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85603f00 1fa0: 00000000 00000000 00000000 00000000 Call trace: 9d60: 800b0013 ffffffff r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/0:821:5900 blocked for more than 474 seconds. r5:85876c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:858b938c r4:85603f80 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800b0013 r4:80239bd0 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:822:5902 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:822 state:D stack:0 pid:5902 tgid:5902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec901d84 r8:00000002 r7:60000113 r6:ec901d8c r5:85876000 r4:85876000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85876000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec901e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a04f80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85876000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ab000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858b978c r4:858b9400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858b978c r4:851b4000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85876000 r8:851b402c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b4000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4000 r8:8027ed34 r7:ec8a5e60 r6:851c5300 r5:85876000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec901fb0 to 0xec901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85608680 INFO: task kworker/0:822:5902 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9ca89000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:857fec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:858bab8c r4:858ba800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858bab8c r4:851b4080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:857fec00 r8:851b40ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b4080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4080 r8:8027ed34 r7:ec8a5e60 r6:851c5380 r5:857fec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec909fb0 to 0xec909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a31c0 INFO: task kworker/0:823:5905 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9cb9c000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:824:5906 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:824 state:D stack:0 pid:5906 tgid:5906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec90dd84 r8:00000002 r7:60000113 r6:ec90dd8c r5:85878000 r4:85878000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85878000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec90de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a3280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85878000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ed000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85878000 r8:851b412c r7:82804d40 r6:dddced40 r5:dddced60 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:e06b9dc0 r4:00000000 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:825:5908 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred r10:829187f4 r9:ec915d84 r8:00000002 r7:60000013 r6:ec915d8c r5:85879800 r4:85879800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85879800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec915e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a3440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85879800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec70d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ba38c r4:858ba000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858ba38c r4:851b4180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85879800 r8:851b41ac r7:82804d40 r6:dddced40 r5:dddced60 r4:851b4180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4180 r8:8027ed34 r7:ec909e60 r6:851c5480 r5:85879800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec915fb0 to 0xec915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a3100 INFO: task kworker/0:825:5908 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9d12b000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:826:5910 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:85836c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8fde08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a3580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85836c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec723000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ba78c r4:858ba400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858ba78c r4:851b4200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85836c00 r8:851b422c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b4200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4200 r8:8027ed34 r7:ec909e60 r6:851b4280 r5:85836c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8fdfb0 to 0xec8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a32c0 INFO: task kworker/0:826:5910 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9d12b000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:827:5913 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:827 state:D stack:0 pid:5913 tgid:5913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec91dd84 r8:00000002 r7:60000113 r6:ec91dd8c r5:85836000 r4:85836000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85836000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec91de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a3900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85836000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec749000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858baf8c r4:858bac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858baf8c r4:851b4300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85836000 r8:851b432c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b4300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4300 r8:8027ed34 r7:ec909e60 r6:851b4380 r5:85836000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec91dfb0 to 0xec91dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a3500 INFO: task kworker/0:827:5913 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9d591000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:85833c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec87de08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a3a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85833c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec757000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bb38c r4:858bb000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858bb38c r4:851b4400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85833c00 r8:851b442c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b4400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4400 r8:8027ed34 r7:ec91de60 r6:851b4480 r5:85833c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec87dfb0 to 0xec87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a3500 INFO: task kworker/0:828:5914 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9d591000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:829:5917 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:829 state:D stack:0 pid:5917 tgid:5917 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec921d84 r8:00000002 r7:60000113 r6:ec921d8c r5:858f0000 r4:858f0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858f0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec921e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a3b00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec773000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bb78c r4:858bb400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858bb78c r4:851b4500 r10:61c88647 r9:858f0000 r8:851b452c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9d7eb000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:858f0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:831 state:D stack:0 pid:5921 tgid:5921 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858f1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec931e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851a3e80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec939000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858bbf8c r4:858bbc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858bbf8c r4:851b4700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f1800 r8:851b472c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b4700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4700 r8:8027ed34 r7:ec929e60 r6:851b4780 r5:858f1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec931fb0 to 0xec931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a3880 INFO: task kworker/0:831:5921 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9dd3d000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:858f2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:833:5925 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:833 state:D stack:0 pid:5925 tgid:5925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec925d84 r8:00000002 r7:60000013 r6:ec925d8c r5:858f3c00 r4:858f3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858f3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec925e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85608900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec951000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c078c r4:858c0400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858c078c r4:851b4900 r10:61c88647 r9:858f3c00 r8:851b492c r7:82804d40 r6:dddced40 r5:dddced60 r4:85608340 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 task:kworker/0:834 state:D stack:0 pid:5927 tgid:5927 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:851b4a00 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:858f5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec961e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85928480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec975000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c0f8c r4:858c0c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858c0f8c r4:851b4b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858f5400 r8:851b4b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b4b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4b00 r8:8027ed34 r7:ec955e60 r6:851b4b80 r5:858f5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec961fb0 to 0xec961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851a3f80 INFO: task kworker/0:835:5928 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9eb96000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:8501378c r4:85013400 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:836:5932 blocked for more than 475 seconds. r5:858f3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06b9dc0 r5:00001000 r4:dfacd000 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:858f6c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec979e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:838:5937 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:838 state:D stack:0 pid:5937 tgid:5937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec96dd84 r8:00000002 r7:60000113 r6:ec96dd8c r5:858f6000 r4:858f6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858f6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec96de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85928880 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf39000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c1b8c r4:858c1800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:851b4e00 r8:8027ed34 r7:ec591e60 r6:851b4e80 r5:858f6000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 r5:00001000 r4:dfacd000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:847ccb40 task:kworker/0:839 state:D stack:0 pid:5940 tgid:5940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec7a5d84 r8:00000002 r7:60000113 r6:ec7a5d8c r5:84a20000 r4:84a20000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a20000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec7a5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85928b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a20000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3f9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c238c r4:858c2000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858c238c r4:851b4f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a20000 r8:851b4f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:851b4f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b4f00 r8:8027ed34 r7:ec591e60 r6:851b4f80 r5:84a20000 r4:859288c0 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e06b9dc0 r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:840:5941 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:840 state:D stack:0 pid:5941 tgid:5941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec949d84 r8:00000002 r7:60000013 r6:ec949d8c r5:84a20c00 r5:84a20c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec949e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec949fb0 to 0xec949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859288c0 INFO: task kworker/0:840:5941 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a21800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ec831d84 r8:00000002 r7:60000113 r6:ec831d8c r5:84a23000 r4:84a23000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a23000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec831e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592e340 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a23000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb913000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c378c r4:858c3400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858c378c r4:8592a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a23000 r8:8592a22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8592a200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592a200 r8:8027ed34 r7:ec949e60 r6:8592a280 r5:84a23000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec831fb0 to 0xec831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85928d00 INFO: task kworker/0:842:5944 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: 9faa9000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:843:5946 blocked for more than 475 seconds. r5:84a23c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 r5:00001000 r4:dfacd000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:5948 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:5948 tgid:5948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec83dd84 r8:00000002 r7:60000113 r6:ec83dd8c r5:8587bc00 r4:8587bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8587bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec83de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593a700 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8587bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8587bc00 r8:851c552c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r4:e06b9dc0 r4:00000000 r5:8501378c r4:85013400 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 Not tainted 6.15.0-syzkaller #0 r5:8587c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592e440 r7:dddced40 r6:83018000 r5:858c3b8c r4:8592a400 9fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e06b9dc0 r5:00001000 r4:dfacd000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ec98dd84 r8:00000002 r7:60000113 r6:ec98dd8c r5:8587d400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8592a480 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e06b9dc0 r5:00001000 r4:dfacd000 r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:846:5954 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:846 state:D stack:0 pid:5954 tgid:5954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec855d84 r8:00000002 r7:60000013 r6:ec855d8c r5:84a22400 r4:84a22400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a22400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec855e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592e580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a22400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbff000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c3f8c r4:858c3c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858c3f8c r4:8592a500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a22400 r8:8592a52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8592a500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592a500 r8:8027ed34 r7:ec98de60 r6:8592a580 r5:84a22400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec855fb0 to 0xec855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8592e240 INFO: task kworker/0:846:5954 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a0a04000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a25400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xec985fb0 to 0xec985ff8) INFO: task kworker/0:847:5957 is blocked on a mutex likely owned by task kworker/1:224:3809. r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:848:5958 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:848 state:D stack:0 pid:5958 tgid:5958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec861d84 r8:00000002 r7:60000113 r6:ec861d8c r5:84a26000 r4:84a26000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a26000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec861e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592ea00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a26000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc53000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced40 r6:83018000 r5:858c8b8c r4:8592a700 Exception stack(0xec861fb0 to 0xec861ff8) INFO: task kworker/0:848:5958 is blocked on a mutex likely owned by task kworker/1:224:3809. [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:ec995d84 r8:00000002 r7:60000013 r6:ec995d8c r5:84a26c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:849:5961 is blocked on a mutex likely owned by task kworker/1:224:3809. 9d60: 800b0013 ffffffff r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:850:5963 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:850 state:D stack:0 pid:5963 tgid:5963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9a5d84 r8:00000002 r7:60000013 r6:ec9a5d8c r5:8587b000 r4:8587b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8587b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9a5e08 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:8587b000 r8:8592a82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8592e9c0 r4:00000000 r5:800b0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:8587ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592ee00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8587ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c978c r4:858c9400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858c978c r4:8592a980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8587ec00 r8:8592a9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8592a980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592a980 r8:8027ed34 r7:ec9a5e60 r6:851c5780 r5:8587ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9adfb0 to 0xec9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8592ea40 INFO: task kworker/0:851:5965 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a1a2b000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8501378c r4:85013400 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 task:kworker/0:852 state:D stack:0 pid:5966 tgid:5966 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85878c00 r4:829187f0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85878c00 r8:8592aa2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe06b9d20 to 0xe06b9d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 task:kworker/0:853 state:D stack:0 pid:5968 tgid:5968 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9b9d84 r8:00000002 r7:60000013 r6:ec9b9d8c r5:8587e000 r4:8587e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8587e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9b9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8592ef80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8587e000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcf1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c9b8c r4:858c9800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858c9b8c r4:8592aa80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8587e000 r8:8592aaac r7:82804d40 r6:dddced40 r5:dddced60 r4:8592aa80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592aa80 r8:8027ed34 r7:ec9b1e60 r6:851c5880 r5:8587e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9b9fb0 to 0xec9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8592ec80 INFO: task kworker/0:853:5968 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a1ddd000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:8587a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:858c9f8c r4:858c9c00 r10:00000000 r9:8592ab00 r8:8027ed34 r7:ec9b1e60 r6:851c5900 r5:8587a400 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:855:5973 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:855 state:D stack:0 pid:5973 tgid:5973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9c5d84 r8:00000002 r7:60000013 r6:ec9c5d8c r5:85880000 r4:85880000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85880000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85944040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85880000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ca38c r4:858ca000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858ca38c r4:8592ab80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85880000 r8:8592abac r7:82804d40 r6:dddced40 r5:dddced60 r4:8592ab80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592ab80 r8:8027ed34 r7:ec9b1e60 r6:851c5980 r5:85880000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c5fb0 to 0xec9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85944100 INFO: task kworker/0:855:5973 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a2340000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:dfacd000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847da200 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:856:5974 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred r4:85880c00 r5:85880c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9c9e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858ca78c r4:858ca400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858ca78c r4:8592ac00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85880c00 r8:8592ac2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8592ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592ac00 r8:8027ed34 r7:ec9b1e60 r6:851c5a00 r5:85880c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9c9fb0 to 0xec9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85944100 INFO: task kworker/0:856:5974 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a2340000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:857 state:D stack:0 pid:5977 tgid:5977 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85883000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:857:5977 is blocked on a mutex likely owned by task kworker/1:224:3809. [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:858 state:D stack:0 pid:5979 tgid:5979 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85883c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9dde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859449c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85883c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7bf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858cbb8c r4:858cb800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858cbb8c r4:8592ad00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85883c00 r8:8592ad2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8592ad00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592ad00 r8:8027ed34 r7:ec9d5e60 r6:851c5b00 r5:85883c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9ddfb0 to 0xec9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85944400 INFO: task kworker/0:858:5979 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a2770000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:85884800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:859:5980 is blocked on a mutex likely owned by task kworker/1:224:3809. r5:800b0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:860:5982 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:860 state:D stack:0 pid:5982 tgid:5982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec99dd84 r8:00000002 r7:60000113 r6:ec99dd8c r5:85875400 r4:85875400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85875400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec99de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85944840 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85875400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858cb78c r4:858cb400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858cb78c r4:8592ae00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85875400 r8:8592ae2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8592ae00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592ae00 r8:8027ed34 r7:ec9dde60 r6:8592ae80 r5:85875400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec99dfb0 to 0xec99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a24800 r4:829187f0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:858d438c r4:8592af00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a24800 r8:8592af2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8592af00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592af00 r8:8027ed34 r7:ec9dde60 r6:8592af80 r5:84a24800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9e5fb0 to 0xec9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859447c0 INFO: task kworker/0:861:5985 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a2f98000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:862:5986 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:862 state:D stack:0 pid:5986 tgid:5986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec999d84 r8:00000002 r7:60000013 r6:ec999d8c r5:84aa8000 r4:84aa8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aa8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec999e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85944ac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84aa8000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7cf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858cbf8c r4:858cbc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858cbf8c r4:85950000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aa8000 r8:8595002c r7:82804d40 r6:dddced40 r5:dddced60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:8501378c r4:85013400 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:863:5990 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:863 state:D stack:0 pid:5990 tgid:5990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9edd84 r8:00000002 r7:60000113 r6:ec9edd8c r5:84aa8c00 r4:84aa8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aa8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85944dc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84aa8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 r10:61c88647 r9:84aa8c00 r8:8595012c r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847da200 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:84aaa400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:858d4b8c r4:85950200 5fa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:00000000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:865:5993 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:865 state:D stack:0 pid:5993 tgid:5993 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec9f1d84 r8:00000002 r7:60000013 r6:ec9f1d8c r5:84aab000 r4:84aab000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aab000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9f1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85928f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84aab000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec869000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d4f8c r4:858d4c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858d4f8c r4:85950300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84aab000 r8:8595032c r7:82804d40 r6:dddced40 r5:dddced60 r4:85950300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85950300 r8:8027ed34 r7:ec9f5e60 r6:85950380 r5:84aab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9f1fb0 to 0xec9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85944c40 INFO: task kworker/0:865:5993 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a39bd000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e06b9dc0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:866:5995 blocked for more than 475 seconds. r5:84aa9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85953100 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84aa9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9ff000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d538c r4:858d5000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:858d538c r4:85950400 r10:61c88647 r9:84aa9800 r8:8595042c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:867 state:D stack:0 pid:5997 tgid:5997 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84aad400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85953600 r10:61c88647 r9:84aad400 r8:8595052c r7:82804d40 r6:dddced40 r5:dddced60 r4:85953040 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 Exception stack(0xe06b9fb0 to 0xe06b9ff8) r5:84aabc00 r4:829187f0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:869:6001 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:869 state:D stack:0 pid:6001 tgid:6001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca25d84 r8:00000002 r7:60000013 r6:eca25d8c r5:84aae000 r4:84aae000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84aae000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe06b9d20 to 0xe06b9d68) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Not tainted 6.15.0-syzkaller #0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca31e08 r10:61c88647 r9:84aaec00 r8:8595082c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a4870000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:84aac800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca3de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85953a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84aac800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:e06b9dc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85900000 r5:85900000 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:858d6b8c r4:858d6800 r4:85950a00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:e06b9dc0 r5:00001000 r4:dfacd000 r4:847da200 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:873:6009 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:873 state:D stack:0 pid:6009 tgid:6009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca5dd84 r8:00000002 r7:60000013 r6:eca5dd8c r5:85901800 r4:85901800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85901800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d20: a4d79000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eca79d84 r8:00000002 r7:60000113 r6:eca79d8c r5:85903c00 r5:85903c00 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca79fb0 to 0xeca79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8595f1c0 INFO: task kworker/1:562:6012 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a5383000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85902400 r4:829187f0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb13b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d778c r4:857d7400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d778c r4:851c5c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85902400 r8:851c5cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85900c00 r4:829187f0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595d140 5fa0: 00000000 00000000 00000000 00000000 r4:e06b9dc0 r5:8501378c r4:85013400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85903000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595f440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85903000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca93000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d5f8c r4:857d5c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d5f8c r4:851c5d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e06b9dc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000001 Workqueue: events bpf_prog_free_deferred r5:00001000 r4:dfacd000 Exception stack(0xe06b9fb0 to 0xe06b9ff8) r10:829187f4 r9:ecaa5d84 r8:00000002 r7:60000013 r6:ecaa5d8c r5:85905400 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:85950e80 r8:8027ed34 r7:eca5de60 r6:85950f80 r5:85905400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaa5fb0 to 0xecaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8595d080 INFO: task kworker/0:875:6020 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a6308000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ecab5d84 r8:00000002 r7:60000113 r6:ecab5d8c r5:85908000 r5:85908000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595f6c0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/1:567:6023 blocked for more than 476 seconds. r5:85909800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecac5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595f800 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85909800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecac7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d6b8c r4:857d6800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d6b8c r4:851c5e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85909800 r8:851c5eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851c5e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c5e80 r8:8027ed34 r7:eca81e60 r6:85952080 r5:85909800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecac5fb0 to 0xecac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8595f540 INFO: task kworker/1:567:6023 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a6308000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/1:568:6025 blocked for more than 476 seconds. r4:8590b000 r5:8590b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecad5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595fbc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8590b000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae6b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d738c r4:857d7000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d738c r4:851c5f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8590b000 r8:851c5f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851c5f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c5f00 r8:8027ed34 r7:eca81e60 r6:85952100 r5:8590b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad5fb0 to 0xecad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8595f680 INFO: task kworker/1:568:6025 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a6308000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ecad1d84 r8:00000002 r7:60000113 r6:ecad1d8c r5:85908c00 r5:85908c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85908c00 r8:859521ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85952180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85952180 r8:8027ed34 r7:eca5de60 r6:85952200 r5:85908c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecad1fb0 to 0xecad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8595d800 INFO: task kworker/0:876:6028 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:e06b9dc0 r5:00001000 r4:dfacd000 r4:847da200 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8590c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe06b9d20 to 0xe06b9d68) r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:878:6032 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:878 state:D stack:0 pid:6032 tgid:6032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec88dd84 r8:00000002 r7:60000013 r6:ec88dd8c r5:85885400 r4:85885400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85885400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec88de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595d280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85885400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe06b9d20 to 0xe06b9d68) r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85886c00 r5:85886c00 r4:829187f0 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:00001000 r4:dfacd000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:6037 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:6037 tgid:6037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8cdd84 r8:00000002 r7:60000113 r6:ec8cdd8c r5:85886000 r4:85886000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85886000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8cde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85966880 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85886000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec775000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d7b8c r4:857d7800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d7b8c r4:85959100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85886000 r8:8595912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85959100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85959100 r8:8027ed34 r7:eca19e60 r6:85959180 r5:85886000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8cdfb0 to 0xec8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8595fa40 INFO: task kworker/1:570:6037 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a72e0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:879 state:D stack:0 pid:6039 tgid:6039 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85881800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85881800 r8:8595242c r7:82804d40 r6:dddced40 r5:dddced60 r4:8595dc80 r4:00000000 r4:82ac11e4 r4:e06b9dc0 r5:00001000 r4:dfacd000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85882400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85882400 r8:859524ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85952480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85952480 r8:8027ed34 r7:ecae9e60 r6:85959280 r5:85882400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaedfb0 to 0xecaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8595dec0 INFO: task kworker/0:880:6041 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a72e0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:881:6043 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:881 state:D stack:0 pid:6043 tgid:6043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8e5d84 r8:00000002 r7:60000113 r6:ec8e5d8c r5:8590d400 r4:8590d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8590d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8e5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594b300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8590d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb83b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85974b8c r4:85974800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85974b8c r4:85952500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8590d400 r8:8595252c r7:82804d40 r6:dddced40 r5:dddced60 r4:85952500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85952500 r8:8027ed34 r7:ecae9e60 r6:85952580 r5:8590d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8e5fb0 to 0xec8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8594b240 INFO: task kworker/0:881:6043 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a72e0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8590e000 r5:8590e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8597538c r4:85975000 r4:85952600 1fa0: 00000000 00000000 00000000 00000000 Call trace: 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:883 state:D stack:0 pid:6048 tgid:6048 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8590ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaf5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594b740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8590ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597578c r4:85975400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597578c r4:85952700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8590ec00 r8:8595272c r7:82804d40 r6:dddced40 r5:dddced60 r4:85952700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85952700 r8:8027ed34 r7:ecaf1e60 r6:85952780 r5:8590ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaf5fb0 to 0xecaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8594b380 INFO: task kworker/0:883:6048 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a7bd6000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:884 state:D stack:0 pid:6051 tgid:6051 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8590bc00 r4:829187f0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r7:dddced40 r6:83018000 r5:85975b8c r4:85952800 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:884:6051 is blocked on a mutex likely owned by task kworker/1:224:3809. [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:885:6052 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:885 state:D stack:0 pid:6052 tgid:6052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecafdd84 r8:00000002 r7:60000113 r6:ecafdd8c r5:8590a400 r4:8590a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8590a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecafde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594bc00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8590a400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb2b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597638c r4:85976000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597638c r4:85952900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8590a400 r8:8595292c r7:82804d40 r6:dddced40 r5:dddced60 r4:85952900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85906c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb01e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb01fb0 to 0xecb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8594b980 INFO: task kworker/0:886:6053 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a82a2000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85904800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:888:6058 blocked for more than 476 seconds. r5:85918000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85976b8c r4:85976800 r4:85952c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:888:6058 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a8594000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:889:6060 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:889 state:D stack:0 pid:6060 tgid:6060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb11d84 r8:00000002 r7:60000013 r6:ecb11d8c r5:85918c00 r4:85918c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85918c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594b000 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85918c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec685000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85976f8c r4:85976c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85976f8c r4:85952d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85952d00 r8:8027ed34 r7:ecb0de60 r6:85952d80 r5:85918c00 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:890:6063 blocked for more than 476 seconds. r5:85919800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8595d1c0 INFO: task kworker/0:890:6063 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a8b78000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:891:6064 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:891 state:D stack:0 pid:6064 tgid:6064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb09d84 r8:00000002 r7:60000113 r6:ecb09d8c r5:8591a400 r4:8591a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85952f00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:829187f4 r9:ecb21d84 r8:00000002 r7:60000113 r6:ecb21d8c r5:8591b000 r4:8591b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596c040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8591b000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6ff000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85977b8c r4:85977800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85977b8c r4:85969000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8591b000 r8:8596902c r7:82804d40 r6:dddced40 r5:dddced60 r4:85969000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85969000 r8:8027ed34 r7:ecb09e60 r6:85969080 r5:8591b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb21fb0 to 0xecb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8594be00 INFO: task kworker/0:892:6065 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a8fc3000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8591bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85977f8c r4:85969100 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8591c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596c440 r10:61c88647 r9:8591c800 r8:8596922c r7:82804d40 r6:dddced40 r5:dddced60 r4:8596c1c0 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a98d9000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:895:6072 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:895 state:D stack:0 pid:6072 tgid:6072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb29d84 r8:00000002 r7:60000113 r6:ecb29d8c r5:8591d400 r4:8591d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85971300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8591d400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8591d400 r8:859693ac r7:82804d40 r6:dddced40 r5:dddced60 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:896 state:D stack:0 pid:6074 tgid:6074 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8597c78c r4:8597c400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597c78c r4:85969300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8591e000 r8:8596932c r7:82804d40 r6:dddced40 r5:dddced60 r4:85969300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85969300 r8:8027ed34 r7:ecb29e60 r6:85969480 r5:8591e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb2dfb0 to 0xecb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596c3c0 INFO: task kworker/0:896:6074 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: a9b8a000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 r4:e06b9dc0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84a98000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84a9a400 r4:829187f0 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85966ac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844dbb8c r4:844db800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844dbb8c r4:85959300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9a400 r8:8595932c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85959300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85959300 r8:8027ed34 r7:eca19e60 r6:85969600 r5:84a9a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb3dfb0 to 0xecb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85966780 INFO: task kworker/1:571:6079 is blocked on a mutex likely owned by task kworker/1:224:3809. r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84a98c00 r4:829187f0 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r5:00001000 r4:dfacd000 r4:00000001 Not tainted 6.15.0-syzkaller #0 r5:84a9bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r7:ddde2d40 r6:83018200 r5:8585c38c r4:85959380 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: aa272000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:573:6084 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:6084 tgid:6084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb4dd84 r8:00000002 r7:60000113 r6:ecb4dd8c r5:84a9b000 r4:84a9b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a9b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85966f00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844db78c r4:844db400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844db78c r4:85959400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9b000 r8:8595942c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85959400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85959400 r8:8027ed34 r7:ecb49e60 r6:85969800 r5:84a9b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb4dfb0 to 0xecb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85966940 INFO: task kworker/1:573:6084 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:899:6085 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:899 state:D stack:0 pid:6085 tgid:6085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb51d84 r8:00000002 r7:60000113 r6:ecb51d8c r5:84a9c800 r4:84a9c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a9c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb51e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb51fb0 to 0xecb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596cec0 INFO: task kworker/0:899:6085 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:800b0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ccb40 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a99800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:8597d78c r4:8597d400 r10:61c88647 r9:84a99800 r8:859699ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:00000000 r5:8501378c r4:85013400 r4:847da200 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb59d84 r8:00000002 r7:60000113 r6:ecb59d8c r5:84a9ec00 r4:84a9ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a9ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb59e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85971500 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a9ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec917000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597df8c r4:8597dc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597df8c r4:85969a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a9ec00 r8:85969aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85969a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85969a80 r8:8027ed34 r7:ecb29e60 r6:85969b00 r5:84a9ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb59fb0 to 0xecb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85971180 INFO: task kworker/0:901:6090 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ab304000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a9e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85971700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:859b0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85971900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec943000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597e78c r4:8597e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597e78c r4:85969c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b0000 r8:85969cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85969c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85969c80 r8:8027ed34 r7:ecb5de60 r6:85969d00 r5:859b0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb61fb0 to 0xecb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85971580 INFO: task kworker/0:903:6094 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ab471000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ecb31d84 r8:00000002 r7:60000013 r6:ecb31d8c r5:85888000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb31e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85971780 Call trace: 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ecb6dd84 r8:00000002 r7:60000013 r6:ecb6dd8c r5:8588a400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb6de08 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597eb8c r4:8597e800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597eb8c r4:85969e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8588a400 r8:85969e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85969e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85969e00 r8:8027ed34 r7:ecb31e60 r6:85959500 r5:8588a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb6dfb0 to 0xecb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85971800 INFO: task kworker/0:905:6099 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: abe18000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:85889800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:907:6101 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:907 state:D stack:0 pid:6101 tgid:6101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb45d84 r8:00000002 r7:60000013 r6:ecb45d8c r5:859b0c00 r4:859b0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dc00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab95000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85969f00 r8:8027ed34 r7:ecb71e60 r6:85969f80 r5:859b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb45fb0 to 0xecb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85971880 INFO: task kworker/0:907:6101 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ac142000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:908:6108 blocked for more than 476 seconds. r5:859b2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597fb8c r4:8597f800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597fb8c r4:859ed000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b2400 r8:859ed02c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ed000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ed000 r8:8027ed34 r7:ecb71e60 r6:859ed080 r5:859b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb19fb0 to 0xecb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85971f80 INFO: task kworker/0:908:6108 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 r4:00000000 r5:8501378c r4:85013400 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:909:6109 blocked for more than 476 seconds. r5:859b3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800b0013 r4:80239bd0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:847ccb40 Workqueue: events bpf_prog_free_deferred r5:859b3c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85971fc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb043000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598838c r4:85988000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8598838c r4:859ed200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b3c00 r8:859ed22c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ed200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ed200 r8:8027ed34 r7:eca15e60 r6:859ed280 r5:859b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca21fb0 to 0xeca21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e340 INFO: task kworker/0:910:6110 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ad39f000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r4:859b4800 r5:859b4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:85988b8c r4:85988800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:911:6111 is blocked on a mutex likely owned by task kworker/1:224:3809. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:912:6112 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:912 state:D stack:0 pid:6112 tgid:6112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca39d84 r8:00000002 r7:60000113 r6:eca39d8c r5:859b5400 r4:859b5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f1900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598878c r4:85988400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8598878c r4:859ed400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b5400 r8:859ed42c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ed400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ed400 r8:8027ed34 r7:eca2de60 r6:859ed480 r5:859b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca39fb0 to 0xeca39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f1040 INFO: task kworker/0:912:6112 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:800b0013 r4:80239bd0 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:575:6116 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:575 state:D stack:0 pid:6116 tgid:6116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca75d84 r8:00000002 r7:60000113 r6:eca75d8c r5:859b6000 r4:859b6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85971440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844daf8c r4:844dac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844daf8c r4:85959680 r10:00000000 r9:85959680 r8:8027ed34 r7:ecb49e60 r6:859ed580 r5:859b6000 INFO: task kworker/1:575:6116 is blocked on a mutex likely owned by task kworker/1:224:3809. [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 task:kworker/1:576 state:D stack:0 pid:6118 tgid:6118 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:859b8000 r8:8595972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca99fb0 to 0xeca99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85966c80 INFO: task kworker/1:576:6118 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: adbc9000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:577:6120 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:577 state:D stack:0 pid:6120 tgid:6120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca05d84 r8:00000002 r7:60000013 r6:eca05d8c r5:859b8c00 r4:859b8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f34c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8585cb8c r4:8585c800 r10:61c88647 r9:859b8c00 r8:859597ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeca05fb0 to 0xeca05ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800b0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:00000000 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847da200 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:913:6122 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:913 state:D stack:0 pid:6122 tgid:6122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca8dd84 r8:00000002 r7:60000013 r6:eca8dd8c r5:859b9800 r4:859b9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f1b00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec76f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85988f8c r4:85988c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85988f8c r4:859ed700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b9800 r8:859ed72c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ed700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ed700 r8:8027ed34 r7:eca2de60 r6:859ed780 r5:859b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca8dfb0 to 0xeca8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f18c0 INFO: task kworker/0:913:6122 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ae023000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:8501378c r4:85013400 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:859ba400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f32c0 INFO: task kworker/1:578:6126 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ae420000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:579:6128 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:579 state:D stack:0 pid:6128 tgid:6128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecae5d84 r8:00000002 r7:60000013 r6:ecae5d8c r5:859bc800 r4:859bc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859bc800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f39c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585db8c r4:8585d800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8585db8c r4:85959880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859bc800 r8:859598ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85959880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85959880 r8:8027ed34 r7:ecabde60 r6:859ed880 r5:859bc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae5fb0 to 0xecae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f3600 INFO: task kworker/1:579:6128 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ae420000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:847ccb40 Workqueue: events bpf_prog_free_deferred r5:8588bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8585d38c r4:8585d000 r4:85959900 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:580:6129 is blocked on a mutex likely owned by task kworker/1:224:3809. [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:800b0013 r4:80239bd0 r4:e06b9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r5:00001000 r4:dfacd000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:581:6133 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:581 state:D stack:0 pid:6133 tgid:6133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecacdd84 r8:00000002 r7:60000013 r6:ecacdd8c r5:8588d400 r4:8588d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8588d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecacde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f3880 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8588d400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec541000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585d78c r4:8585d400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8585d78c r4:85959a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8588d400 r8:85959a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85959a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85959a00 r8:8027ed34 r7:ecae5e60 r6:85959a80 r5:8588d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecacdfb0 to 0xecacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f3900 INFO: task kworker/1:581:6133 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:e06b9dc0 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ecb85d84 r8:00000002 r7:60000113 r6:ecb85d8c r5:8588e000 r5:8588e000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8585e38c r4:8585e000 r7:ddde2d40 r6:83018200 r5:8585e38c r4:85959b00 r4:85959b00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r4:859f3840 INFO: task kworker/1:582:6134 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ae8f0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:583:6135 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:583 state:D stack:0 pid:6135 tgid:6135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecaadd84 r8:00000002 r7:60000113 r6:ecaadd8c r5:8588ec00 r4:8588ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8588ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f3c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8588ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec607000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585df8c r4:8585dc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8585df8c r4:85959c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8588ec00 r8:85959c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85959c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85959c00 r8:8027ed34 r7:ecb85e60 r6:85959c80 r5:8588ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaadfb0 to 0xecaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f3840 INFO: task kworker/1:583:6135 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: aef7d000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e06b9dc0 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ccb40 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8588c800 r4:829187f0 r4:00000000 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 Call trace: 9d60: 800b0013 ffffffff r4:e06b9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:585:6139 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:585 state:D stack:0 pid:6139 tgid:6139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb91d84 r8:00000002 r7:60000113 r6:ecb91d8c r5:8588b000 r4:8588b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8588b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f3f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8588b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585e78c r4:8585e400 r4:85959e00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:847ccb40 r10:829187f4 r9:ecb95d84 r8:00000002 r7:60000113 r6:ecb95d8c r5:85888c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85888c00 r8:859ed92c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:586:6144 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:586 state:D stack:0 pid:6144 tgid:6144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb99d84 r8:00000002 r7:60000113 r6:ecb99d8c r5:8591ec00 r4:8591ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb99e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85958040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8591ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585ef8c r4:8585ec00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8585ef8c r4:85959f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8591ec00 r8:85959fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85959f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85959f80 r8:8027ed34 r7:ecb8de60 r6:85961000 r5:8591ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb99fb0 to 0xecb99ff8) 9fa0: 00000000 00000000 00000000 00000000 Call trace: r5:800b0013 r4:80239bd0 r4:e06b9dc0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a9d400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85958440 r7:ddde2d40 r6:83018200 r5:8585f78c r4:85961080 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859582c0 INFO: task kworker/1:587:6147 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: af73e000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8501378c r4:85013400 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:588:6149 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:588 state:D stack:0 pid:6149 tgid:6149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecba5d84 r8:00000002 r7:60000113 r6:ecba5d8c r5:85890000 r4:85890000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85890000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85958280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85890000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585f38c r4:8585f000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8585f38c r4:85961180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85961180 r8:8027ed34 r7:ecb9de60 r6:85961200 r5:85890000 INFO: task kworker/1:588:6149 is blocked on a mutex likely owned by task kworker/1:224:3809. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:00001000 r4:dfacd000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85890c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85958a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85890c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9bd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586438c r4:85864000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8586438c r4:85961280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85890c00 r8:859612ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961280 r8:8027ed34 r7:ecb9de60 r6:85961300 r5:85890c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba1fb0 to 0xecba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859582c0 INFO: task kworker/1:589:6150 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 800b0013 ffffffff r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 INFO: task kworker/1:590:6151 blocked for more than 477 seconds. r5:85892400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8585fb8c r4:8585f800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8585fb8c r4:85961380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85892400 r8:859613ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961380 r8:8027ed34 r7:ecba1e60 r6:85961400 r5:85892400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbadfb0 to 0xecbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859585c0 INFO: task kworker/1:590:6151 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d60: 800b0013 ffffffff r4:82ac11e4 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 r4:847ccb40 task:kworker/0:915 state:D stack:0 pid:6153 tgid:6153 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:859bd400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594f100 r7:dddced40 r6:83018000 r5:8598938c r4:859ed980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859bd400 r8:859ed9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859ed980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ed980 r8:8027ed34 r7:ecb95e60 r6:859eda00 r5:859bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb1fb0 to 0xecbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8594f000 INFO: task kworker/0:915:6153 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b0329000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859bb000 r5:859bb000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:859bb000 r8:859614ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 r5:00001000 r4:dfacd000 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:592 state:D stack:0 pid:6157 tgid:6157 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859be000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586578c r4:85865400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8586578c r4:85961500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859be000 r8:8596152c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961500 r8:8027ed34 r7:ecba1e60 r6:859edb00 r5:859be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb9fb0 to 0xecbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85958800 INFO: task kworker/1:592:6157 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b0bbf000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:593:6158 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:859bec00 r5:859bec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586478c r4:85864400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8586478c r4:85961580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859bec00 r8:859615ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961580 r8:8027ed34 r7:ecbb9e60 r6:859edb80 r5:859bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbbdfb0 to 0xecbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85958800 INFO: task kworker/1:593:6158 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b0bbf000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:859b6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc5e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85958980 r4:00000000 9d60: 800b0013 ffffffff r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:595:6163 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:595 state:D stack:0 pid:6163 tgid:6163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbd1d84 r8:00000002 r7:60000013 r6:ecbd1d8c r5:84920000 r4:84920000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84920000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85958dc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84920000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca29000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85864f8c r4:85864c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85864f8c r4:85961680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:859616ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961680 r8:8027ed34 r7:ecbb9e60 r6:859edc80 r5:84920000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd1fb0 to 0xecbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85958c40 INFO: task kworker/1:595:6163 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b1511000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:596 state:D stack:0 pid:6164 tgid:6164 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84922400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85961700 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b1511000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:597:6167 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:597 state:D stack:0 pid:6167 tgid:6167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbe1d84 r8:00000002 r7:60000113 r6:ecbe1d8c r5:84920c00 r4:84920c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84920c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593d980 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:597:6167 is blocked on a mutex likely owned by task kworker/1:224:3809. [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84921800 r4:829187f0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85961800 r8:8027ed34 r7:ecbe1e60 r6:859ede00 r5:84921800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe9fb0 to 0xecbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85958e80 INFO: task kworker/1:598:6169 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b1b88000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:ecbedd84 r8:00000002 r7:60000113 r6:ecbedd8c r5:84924800 r5:84924800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85961880 r8:8027ed34 r7:ecbe1e60 r6:859ede80 r5:84924800 Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84923c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593d280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84923c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecac1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586638c r4:85866000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8586638c r4:85961900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84923c00 r8:8596192c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961900 r8:8027ed34 r7:ecbe1e60 r6:859edf00 r5:84923c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf9fb0 to 0xecbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593d1c0 INFO: task kworker/1:600:6173 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b1b88000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:847ccb40 task:kworker/1:601 state:D stack:0 pid:6175 tgid:6175 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84923000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84923000 r8:859619ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06b9dc0 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:602:6177 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:602 state:D stack:0 pid:6177 tgid:6177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc15d84 r8:00000002 r7:60000013 r6:ecc15d8c r5:84925400 r4:84925400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84925400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593d540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84925400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc07000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85866b8c r4:85866800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85866b8c r4:85961a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84925400 r8:85961a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961a00 r8:8027ed34 r7:ecbe1e60 r6:85927000 r5:84925400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc15fb0 to 0xecc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593d2c0 INFO: task kworker/1:602:6177 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b245a000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/1:603:6178 blocked for more than 477 seconds. r4:85893000 r5:85893000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba9e08 r4:00000000 r5:00001000 r4:ecc17000 r5:85866f8c r4:85866c00 r7:ddde2d40 r6:83018200 r5:85866f8c r4:85961a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85893000 r8:85961aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961a80 r8:8027ed34 r7:ecbe1e60 r6:85961b00 r5:85893000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba9fb0 to 0xecba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593d340 INFO: task kworker/1:603:6178 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b29f5000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 Exception stack(0xe06b9fb0 to 0xe06b9ff8) Not tainted 6.15.0-syzkaller #0 r5:85893c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc21e08 r4:00000000 r5:8586738c r4:85867000 r10:00000000 r9:85961b80 r8:8027ed34 r7:ecbe1e60 r6:85961c00 r5:85893c00 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:6182 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:605 state:D stack:0 pid:6182 tgid:6182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc2dd84 r8:00000002 r7:60000113 r6:ecc2dd8c r5:85894800 r4:85894800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85894800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593db00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85894800 r7:00000000 r6:83018200 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85867b8c r4:85867800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85867b8c r4:85961c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85894800 r8:85961cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961c80 r8:8027ed34 r7:ecbe1e60 r6:85961d00 r5:85894800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc2dfb0 to 0xecc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593d600 INFO: task kworker/1:605:6182 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b2f7d000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85896c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb7de08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85971c80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85896c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85989b8c r4:85927080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85896c00 r8:859270ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85927080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927080 r8:8027ed34 r7:ecb95e60 r6:85961d80 r5:85896c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb7dfb0 to 0xecb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85971980 INFO: task kworker/0:916:6188 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b31c3000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:606 state:D stack:0 pid:6190 tgid:6190 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85895400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85961e00 r8:8027ed34 r7:ecc2de60 r6:85961e80 r5:85895400 Workqueue: events bpf_prog_free_deferred r5:800b0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r4:00000001 r4:847ccb40 task:kworker/1:607 state:D stack:0 pid:6191 tgid:6191 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85891800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859260c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85891800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb81b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989f8c r4:85989c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989f8c r4:85961f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85891800 r8:85961f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961f00 r8:8027ed34 r7:ecc3de60 r6:85961f80 r5:85891800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc41fb0 to 0xecc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593d900 INFO: task kworker/1:607:6191 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b31c3000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:917:6192 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:917 state:D stack:0 pid:6192 tgid:6192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85898000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc45e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:918:6193 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:918 state:D stack:0 pid:6193 tgid:6193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8d5d84 r8:00000002 r7:60000013 r6:ec8d5d8c r5:85898c00 r4:85898c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85898c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85898c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb91f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598a38c r4:8598a000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8598a38c r4:85927180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85898c00 r8:859271ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85927180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927180 r8:8027ed34 r7:ecc45e60 r6:8592b080 r5:85898c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d5fb0 to 0xec8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85926040 INFO: task kworker/0:918:6193 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 9d60: 800b0013 ffffffff r4:82ac11e4 r4:e06b9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:608:6194 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:608 state:D stack:0 pid:6194 tgid:6194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc49d84 r8:00000002 r7:60000113 r6:ecc49d8c r5:85899800 r4:85899800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85899800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85924c40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85899800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccbd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a24f8c r4:85a24c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a24f8c r4:8592b100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85899800 r8:8592b12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8592b100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592b100 r8:8027ed34 r7:ecc3de60 r6:8592b180 r5:85899800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc49fb0 to 0xecc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593df80 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: b3ad9000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:919:6198 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:919 state:D stack:0 pid:6198 tgid:6198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc51d84 r8:00000002 r7:60000013 r6:ecc51d8c r5:8589b000 r4:8589b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8589b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926680 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8589b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598ab8c r4:8598a800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8598ab8c r4:85927200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8589b000 r8:8592722c r7:82804d40 r6:dddced40 r5:dddced60 r4:85927200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927200 r8:8027ed34 r7:ecc45e60 r6:8592b200 r5:8589b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc51fb0 to 0xecc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859262c0 INFO: task kworker/0:919:6198 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b3ed0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06b9dc0 r4:00000000 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:8501378c r4:85013400 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8589bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85927280 r8:8027ed34 r7:ecc51e60 r6:8592b280 r5:8589bc00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859262c0 INFO: task kworker/0:920:6199 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b447d000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:921:6201 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:921 state:D stack:0 pid:6201 tgid:6201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc4dd84 r8:00000002 r7:60000113 r6:ecc4dd8c r5:84926000 r4:84926000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84926000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84926000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598af8c r4:8598ac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8598af8c r4:85927300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84926000 r8:8592732c r7:82804d40 r6:dddced40 r5:dddced60 r4:85927300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927300 r8:8027ed34 r7:ecc55e60 r6:85927380 r5:84926000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc4dfb0 to 0xecc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85926500 INFO: task kworker/0:921:6201 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b447d000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:922:6205 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:922 state:D stack:0 pid:6205 tgid:6205 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84926c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r5:800b0013 r4:80239bd0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85896000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85896000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec67d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598bb8c r4:8598b800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8598bb8c r4:85927500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85896000 r8:8592752c r7:82804d40 r6:dddced40 r5:dddced60 r4:85927500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927500 r8:8027ed34 r7:ecc55e60 r6:85927580 r5:85896000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc5dfb0 to 0xecc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859267c0 INFO: task kworker/0:923:6206 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b4896000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:924:6207 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:924 state:D stack:0 pid:6207 tgid:6207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc39d84 r8:00000002 r7:60000113 r6:ecc39d8c r5:859bbc00 r4:859bbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859bbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926d00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598bf8c r4:8598bc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: b4c7c000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r4:e06b9dc0 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:925:6210 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:925 state:D stack:0 pid:6210 tgid:6210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc65d84 r8:00000002 r7:60000113 r6:ecc65d8c r5:84ae0000 r4:84ae0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ae0000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6df000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597f38c r4:8597f000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597f38c r4:85927700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae0000 r8:8592772c r7:82804d40 r6:dddced40 r5:dddced60 r4:85927700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927700 r8:8027ed34 r7:ecc39e60 r6:85927780 r5:84ae0000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06b9d20 to 0xe06b9d68) 9d60: 800b0013 ffffffff r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r4:847da200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:ecc75d84 r8:00000002 r7:60000013 r6:ecc75d8c r5:8589d400 r5:8589d400 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85926a80 INFO: task kworker/0:926:6212 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b4f4b000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Not tainted 6.15.0-syzkaller #0 r5:8589c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:8589c800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 800b0013 ffffffff r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:928:6215 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:928 state:D stack:0 pid:6215 tgid:6215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc6dd84 r8:00000002 r7:60000113 r6:ecc6dd8c r5:84ae0c00 r4:84ae0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594f480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ae0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec73f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599c78c r4:8599c400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599c78c r4:85927900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae0c00 r8:8592792c r7:82804d40 r6:dddced40 r5:dddced60 r4:85927900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927900 r8:8027ed34 r7:ecc7de60 r6:85927980 r5:84ae0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc6dfb0 to 0xecc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85926dc0 INFO: task kworker/0:928:6215 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b513b000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ecc69d84 r8:00000002 r7:60000113 r6:ecc69d8c r5:84ae2400 r5:84ae2400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593c3c0 r10:61c88647 r9:84ae2400 r8:85927a2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xecc69fb0 to 0xecc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593c100 INFO: task kworker/0:929:6217 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b5471000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:930:6221 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:930 state:D stack:0 pid:6221 tgid:6221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84ae3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fa0: 00000000 00000000 00000000 00000000 9d20: b5471000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:847ccb40 task:kworker/1:609 state:D stack:0 pid:6222 tgid:6222 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84ae4800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85924f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ae4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec90f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2478c r4:85a24400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2478c r4:8592b400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae4800 r8:8592b42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8592b400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592b400 r8:8027ed34 r7:ecc49e60 r6:85927c00 r5:84ae4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc89fb0 to 0xecc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85924a40 INFO: task kworker/1:609:6222 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b5784000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r5:8501378c r4:85013400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84ae3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc81e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:8593c500 Workqueue: events bpf_prog_free_deferred 9d20: b5784000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:932:6225 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:932 state:D stack:0 pid:6225 tgid:6225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc79d84 r8:00000002 r7:60000113 r6:ecc79d8c r5:84ae5400 r4:84ae5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593c800 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ae5400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8bd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599d78c r4:8599d400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599d78c r4:85927d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae5400 r8:85927dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85927d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927d80 r8:8027ed34 r7:ecc85e60 r6:85927e00 r5:84ae5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc79fb0 to 0xecc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593c740 INFO: task kworker/0:932:6225 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b5ea6000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:933:6227 blocked for more than 477 seconds. r5:84ae6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593c740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ae6000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599db8c r4:8599d800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599db8c r4:85927e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae6000 r8:85927eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85927e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927e80 r8:8027ed34 r7:ecc85e60 r6:85927f00 r5:84ae6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc91fb0 to 0xecc91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593c740 INFO: task kworker/0:933:6227 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b5ea6000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:934:6229 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:934 state:D stack:0 pid:6229 tgid:6229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc8dd84 r8:00000002 r7:60000113 r6:ecc8dd8c r5:84ae6c00 r4:84ae6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593cbc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ae6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec933000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599df8c r4:8599dc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599df8c r4:85927f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae6c00 r8:85927fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85927f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927f80 r8:8027ed34 r7:ecc85e60 r6:85943000 r5:84ae6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc8dfb0 to 0xecc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593c900 INFO: task kworker/0:934:6229 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b6196000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:935:6233 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:935 state:D stack:0 pid:6233 tgid:6233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc95d84 r8:00000002 r7:60000013 r6:ecc95d8c r5:84ae1800 r4:84ae1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85943080 r8:8027ed34 r7:ecc85e60 r6:85943100 r5:84ae1800 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:936:6235 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:936 state:D stack:0 pid:6235 tgid:6235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc9dd84 r8:00000002 r7:60000013 r6:ecc9dd8c r5:84a80000 r4:84a80000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a80000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593ce80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a80000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec95b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599e78c r4:8599e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599e78c r4:85943180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a80000 r8:859431ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85943180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85943180 r8:8027ed34 r7:ecc85e60 r6:85943200 r5:84a80000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc9dfb0 to 0xecc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593cc80 INFO: task kworker/0:936:6235 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b6532000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:6236 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r5:84a80c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85a24b8c r4:85a24800 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06b9d20 to 0xe06b9d68) 9d60: 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:937:6238 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:937 state:D stack:0 pid:6238 tgid:6238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc99d84 r8:00000002 r7:60000113 r6:ecc99d8c r5:84a81800 r4:84a81800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a81800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc99e08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8593ce40 9d20: b6b0a000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:938:6239 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:938 state:D stack:0 pid:6239 tgid:6239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecca5d84 r8:00000002 r7:60000013 r6:ecca5d8c r5:84a82400 r4:84a82400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a82400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85966fc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a82400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb37000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599ef8c r4:8599ec00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:939:6242 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:939 state:D stack:0 pid:6242 tgid:6242 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:eccb5d84 r8:00000002 r7:60000113 r6:eccb5d8c r5:84a83000 r5:84a83000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeccb5fb0 to 0xeccb5ff8) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:940:6244 blocked for more than 477 seconds. r5:84a84800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: b73cc000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:847ccb40 task:kworker/1:611 state:D stack:0 pid:6246 tgid:6246 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a86000 r4:829187f0 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2578c r4:85a25400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2578c r4:8592b500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a86000 r8:8592b52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8592b500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592b500 r8:8027ed34 r7:ecc49e60 r6:85943700 r5:84a86000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccd9fb0 to 0xeccd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8595b000 INFO: task kworker/1:611:6246 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b776f000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a83c00 r5:84a83c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8595b000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:859d8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596bbc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599ff8c r4:8599fc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599ff8c r4:85943800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d8c00 r8:8594382c r7:82804d40 r6:dddced40 r5:dddced60 r4:85943800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85943800 r8:8027ed34 r7:eccb5e60 r6:85943880 r5:859d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9cdfb0 to 0xec9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596b840 INFO: task kworker/0:941:6252 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b7bb2000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:942:6253 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:942 state:D stack:0 pid:6253 tgid:6253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccddd84 r8:00000002 r7:60000113 r6:eccddd8c r5:859d9800 r4:859d9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859d9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccdde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85943900 dfa0: 00000000 00000000 00000000 00000000 Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b7bb2000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:859db000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebbe7000 r10:61c88647 r9:859db000 r8:85943a2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe06b9d20 to 0xe06b9d68) r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:944:6257 blocked for more than 478 seconds. r5:859dbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859386c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc81000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a938c r4:859a9000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a938c r4:85943b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859dbc00 r8:85943b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85943b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85943b00 r8:8027ed34 r7:ecbc9e60 r6:85943b80 r5:859dbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf1fb0 to 0xecbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596bf40 INFO: task kworker/0:944:6257 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b8279000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/1:613:6259 blocked for more than 478 seconds. r5:859d8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: b873e000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:847ccb40 Call trace: r5:859dc800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc0de08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc0dfb0 to 0xecc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8595b200 INFO: task kworker/1:614:6260 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b873e000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:945:6262 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:945 state:D stack:0 pid:6262 tgid:6262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc1dd84 r8:00000002 r7:60000113 r6:ecc1dd8c r5:859da400 r4:859da400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859da400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc1de08 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecc1dfb0 to 0xecc1dff8) Workqueue: events bpf_prog_free_deferred 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8589a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc4d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a8f8c r4:859a8c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a8f8c r4:85943e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8589a400 r8:85943e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85943e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85943e00 r8:8027ed34 r7:ecbf1e60 r6:8592b700 r5:8589a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecccdfb0 to 0xecccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85938440 INFO: task kworker/0:946:6265 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b8aed000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:847ccb40 Workqueue: events bpf_prog_free_deferred r5:8589e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 INFO: task kworker/0:948:6268 blocked for more than 478 seconds. r5:8589ec00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ec595000 r10:61c88647 r9:8589ec00 r8:85943f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:949:6273 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:949 state:D stack:0 pid:6273 tgid:6273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbfdd84 r8:00000002 r7:60000013 r6:ecbfdd8c r5:858a0000 r4:858a0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858a0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbfde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85938c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec627000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a9f8c r4:859a9c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a9f8c r4:85943f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a0000 r8:85943fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85943f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85943f80 r8:8027ed34 r7:ecc29e60 r6:8592b880 r5:858a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbfdfb0 to 0xecbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:858a0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85938f00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859aab8c r4:859aa800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859aab8c r4:85934000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a0c00 r8:8593402c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934000 r8:8027ed34 r7:ecbfde60 r6:8592b900 r5:858a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce5fb0 to 0xecce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859384c0 INFO: task kworker/0:950:6274 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b9419000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847da200 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:951 state:D stack:0 pid:6276 tgid:6276 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858a1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85938cc0 r7:dddced40 r6:83018000 r5:859aa38c r4:85934080 9fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r4:e06b9dc0 r4:00000000 r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:952:6278 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:952 state:D stack:0 pid:6278 tgid:6278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccedd84 r8:00000002 r7:60000013 r6:eccedd8c r5:858a2400 r4:858a2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858a2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85938e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859aa78c r4:859aa400 r10:61c88647 r9:858a2400 r8:8593412c r7:82804d40 r6:dddced40 r5:dddced60 r4:85938c40 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:858a3000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8592ba80 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b9be0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:953:6281 blocked for more than 478 seconds. r4:858a4800 r5:858a4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859389c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859aaf8c r4:859aac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859aaf8c r4:85934180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a4800 r8:859341ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85934180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934180 r8:8027ed34 r7:ecce5e60 r6:8592bb80 r5:858a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf9fb0 to 0xeccf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85938d40 INFO: task kworker/0:953:6281 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r5:800b0013 r4:80239bd0 r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:954:6283 blocked for more than 478 seconds. r5:858a6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85947300 r10:61c88647 r9:858a6000 r8:8593422c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d60: 800b0013 ffffffff r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:955 state:D stack:0 pid:6284 tgid:6284 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:858a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:00001000 r4:ec86d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859ab38c r4:859ab000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859ab38c r4:85934280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a6c00 r8:859342ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85934280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934280 r8:8027ed34 r7:ecd01e60 r6:8592bc80 r5:858a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd05fb0 to 0xecd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85938b80 INFO: task kworker/0:955:6284 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ba58b000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06b9fb0 to 0xe06b9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:858a5400 r5:858a5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecd0dfb0 to 0xecd0dff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da200 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85aa0000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecd11fb0 to 0xecd11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85947240 INFO: task kworker/0:957:6288 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: baa4a000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:958:6290 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:958 state:D stack:0 pid:6290 tgid:6290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd19d84 r8:00000002 r7:60000013 r6:ecd19d8c r5:85aa1800 r4:85aa1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aa1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85947940 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa1800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca65000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a64b8c r4:85a64800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a64b8c r4:85934400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa1800 r8:8593442c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:00001000 r4:dfacd000 r4:847da200 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:959:6292 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:959 state:D stack:0 pid:6292 tgid:6292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd21d84 r8:00000002 r7:60000013 r6:ecd21d8c r5:85aa3000 r4:85aa3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aa3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859476c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa3000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca01000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6438c r4:85a64000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6438c r4:85934480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa3000 r8:859344ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85934480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934480 r8:8027ed34 r7:ecd19e60 r6:8592be80 r5:85aa3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd21fb0 to 0xecd21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:8501378c r4:85013400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:960:6294 blocked for more than 478 seconds. r5:859dec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeccfdfb0 to 0xeccfdff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:961:6297 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:961 state:D stack:0 pid:6297 tgid:6297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd25d84 r8:00000002 r7:60000113 r6:ecd25d8c r5:859de000 r4:859de000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859de000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85947b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859de000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca71000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a64f8c r4:85a64c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a64f8c r4:85934600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859de000 r8:8593462c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934600 r8:8027ed34 r7:ecd19e60 r6:85934680 r5:859de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd25fb0 to 0xecd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85947680 INFO: task kworker/0:961:6297 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bacf6000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:962:6298 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:962 state:D stack:0 pid:6298 tgid:6298 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eca9b000 r10:61c88647 r9:859dd400 r8:8593472c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 Not tainted 6.15.0-syzkaller #0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb7f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a65f8c r4:85a65c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a65f8c r4:85934800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa2400 r8:8593482c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934800 r8:8027ed34 r7:eccf5e60 r6:8592bf00 r5:85aa2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd39fb0 to 0xecd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85947a80 INFO: task kworker/0:963:6301 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bb5c1000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecd41fb0 to 0xecd41ff8) Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:965:6304 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:965 state:D stack:0 pid:6304 tgid:6304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd45d84 r8:00000002 r7:60000013 r6:ecd45d8c r5:85aa3c00 r4:85aa3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aa3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85947f00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a65b8c r4:85a65800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a65b8c r4:85934900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xecd45fb0 to 0xecd45ff8) Call trace: 9d60: 800b0013 ffffffff [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85924dc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc09000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6678c r4:85a66400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6678c r4:85934980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa0c00 r8:859349ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85934980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934980 r8:8027ed34 r7:ecd39e60 r6:859f7080 r5:85aa0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd4dfb0 to 0xecd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85947f40 INFO: task kworker/0:966:6306 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bbda7000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe06b9fb0 to 0xe06b9ff8) Not tainted 6.15.0-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd2de08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a6638c r4:85934a00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:616:6310 blocked for more than 478 seconds. task:kworker/1:616 state:D stack:0 pid:6310 tgid:6310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd51d84 r8:00000002 r7:60000113 r6:ecd51d8c r5:85aa6c00 r4:85aa6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aa6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ecd40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85aa6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd61000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2678c r4:85a26400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2678c r4:859f7180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa6c00 r8:859f71ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859f7180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f7180 r8:8027ed34 r7:ecc01e60 r6:859f7200 r5:85aa6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd51fb0 to 0xecd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859ec580 INFO: task kworker/1:616:6310 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bc0c3000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:82ac11e4 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd5de08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:969:6314 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:969 state:D stack:0 pid:6314 tgid:6314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd65d84 r8:00000002 r7:60000013 r6:ecd65d8c r5:85aa8c00 r4:85aa8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aa8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f6040 r4:00000000 r9:83018005 r8:85aa8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 r4:85934b00 Exception stack(0xecd65fb0 to 0xecd65ff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:617 state:D stack:0 pid:6319 tgid:6319 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fd180 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85aaa400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec68f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6978c r4:85a69400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a6978c r4:859f7400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aaa400 r8:859f742c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859f7400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f7400 r8:8027ed34 r7:ecc01e60 r6:859f7480 r5:85aaa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd49fb0 to 0xecd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859ecbc0 INFO: task kworker/1:617:6319 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bce07000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:971:6320 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:971 state:D stack:0 pid:6320 tgid:6320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd85d84 r8:00000002 r7:60000013 r6:ecd85d8c r5:85aab000 r4:85aab000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aab000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f6500 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aab000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd79000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6738c r4:85a67000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6738c r4:85934c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aab000 r8:85934c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934c00 r8:8027ed34 r7:ecd69e60 r6:859f7500 r5:85aab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd85fb0 to 0xecd85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f6000 Workqueue: events bpf_prog_free_deferred 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85a67b8c r4:85a67800 r10:00000000 r9:85934c80 r8:8027ed34 r7:ecd69e60 r6:859f7580 r5:85aabc00 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/0:973:6326 blocked for more than 478 seconds. r5:85aac800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aac800 r8:85934d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934d00 r8:8027ed34 r7:ecd31e60 r6:859f7600 r5:85aac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd8dfb0 to 0xecd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f6640 INFO: task kworker/0:973:6326 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bd5d7000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:859f67c0 Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff r4:00000000 r5:00001000 r4:dfacd000 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f6a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aae000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb843000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6838c r4:85a68000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6838c r4:85934e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aae000 r8:85934e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934e00 r8:8027ed34 r7:ecd8de60 r6:859f7700 r5:85aae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd95fb0 to 0xecd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f6980 INFO: task kworker/0:975:6330 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bdd24000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85aaec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd99e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596d040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aaec00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec741000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a69f8c r4:85a69c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a69f8c r4:85934e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aaec00 r8:85934eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85934e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934e80 r8:8027ed34 r7:ecd8de60 r6:859f7780 r5:85aaec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd99fb0 to 0xecd99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f6ac0 INFO: task kworker/0:976:6332 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bddfe000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:977:6334 blocked for more than 478 seconds. r10:829187f4 r9:ecd9dd84 r8:00000002 r7:60000113 r6:ecd9dd8c r5:85aa5400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd9de08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa5400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a68b8c r4:85a68800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a68b8c r4:85934f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa5400 r8:85934f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934f00 r8:8027ed34 r7:ecd99e60 r6:859f7800 r5:85aa5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd9dfb0 to 0xecd9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f6c40 INFO: task kworker/0:977:6334 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ecda1d84 r8:00000002 r7:60000013 r6:ecda1d8c r5:85ab0000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:85a68f8c r4:85a68c00 r10:00000000 r9:85934f80 r8:8027ed34 r7:ecd99e60 r6:859f7880 r5:85ab0000 INFO: task kworker/0:978:6336 is blocked on a mutex likely owned by task kworker/1:224:3809. r5:800b0013 r4:80239bd0 r4:00000000 r5:00001000 r4:dfacd000 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:979:6337 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:979 state:D stack:0 pid:6337 tgid:6337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecda5d84 r8:00000002 r7:60000113 r6:ecda5d8c r5:85ab0c00 r4:85ab0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ab0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f6300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ab0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcfd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6938c r4:85a69000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6938c r4:859f5000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab0c00 r8:859f502c r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5000 r8:8027ed34 r7:ecd99e60 r6:859f7900 r5:85ab0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecda5fb0 to 0xecda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f6b00 INFO: task kworker/0:979:6337 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: be967000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/0:980:6340 blocked for more than 479 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd89e08 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecd89fb0 to 0xecd89ff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:618:6341 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:618 state:D stack:0 pid:6341 tgid:6341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecda9d84 r8:00000002 r7:60000113 r6:ecda9d8c r5:85ab2400 r4:85ab2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ab2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fd2c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ab2400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6bb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a26f8c r4:85a26c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a26f8c r4:859f7a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab2400 r8:859f7a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859f7a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f7a00 r8:8027ed34 r7:ecc01e60 r6:859f7a80 r5:85ab2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfacd000 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:619 state:D stack:0 pid:6343 tgid:6343 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb1e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535a580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ab3000 r7:00000000 r6:83018200 r5:00001000 r4:7f1d7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd7b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e0f8c r4:844e0c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e0f8c r4:859f7b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab3000 r8:859f7b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859f7b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f7b00 r8:8027ed34 r7:ecc01e60 r6:859f7b80 r5:85ab3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdb1fb0 to 0xecdb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859fd140 INFO: task kworker/1:619:6343 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bf1da000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ccb40 task:kworker/0:981 state:D stack:0 pid:6346 tgid:6346 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdbde08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ec94f000 r10:61c88647 r9:85ab5400 r8:859f512c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: bf470000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:00001000 r4:dfacd000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:982 state:D stack:0 pid:6347 tgid:6347 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdc1e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8596d2c0 INFO: task kworker/0:982:6347 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bf845000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:983:6349 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:983 state:D stack:0 pid:6349 tgid:6349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdc9d84 r8:00000002 r7:60000113 r6:ecdc9d8c r5:85ab4800 r4:85ab4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ab4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdc9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596d400 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ab4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec871000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6a78c r4:85a6a400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:859f5200 r8:8027ed34 r7:ecdbde60 r6:859f7d00 r5:85ab4800 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596d340 INFO: task kworker/0:983:6349 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:00001000 r4:dfacd000 r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/0:984:6351 blocked for more than 479 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:859f5280 r8:8027ed34 r7:ecdbde60 r6:859f7d80 r5:85ab6000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:847ccb40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdd9d84 r8:00000002 r7:60000113 r6:ecdd9d8c r5:85ab8c00 r4:85ab8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ab8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596d6c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ab8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6af8c r4:85a6ac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6af8c r4:859f5300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab8c00 r8:859f532c r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5300 r8:8027ed34 r7:ecdbde60 r6:859f7e00 r5:85ab8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd9fb0 to 0xecdd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596d380 INFO: task kworker/0:985:6353 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bfb61000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdade08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85a6b38c r4:859f5380 Exception stack(0xecdadfb0 to 0xecdadff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bfb61000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecddde08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a6b78c r4:859f5480 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:988:6360 blocked for more than 479 seconds. r4:84938000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb5e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a6c38c r4:859f5580 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596d940 INFO: task kworker/0:988:6360 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c0006000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:847ccb40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:989 state:D stack:0 pid:6362 tgid:6362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecde5d84 r8:00000002 r7:60000013 r6:ecde5d8c r5:84938c00 r4:84938c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84938c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596dc40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84938c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6bf8c r4:85a6bc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6bf8c r4:859f5680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84938c00 r8:859f56ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5680 r8:8027ed34 r7:ecdb5e60 r6:859f5700 r5:84938c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecde5fb0 to 0xecde5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d60: 800b0013 ffffffff r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde1e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a6cf8c r4:85a6cc00 r10:00000000 r9:859f5780 r8:8027ed34 r7:ecdb5e60 r6:859f5800 r5:84939800 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596d540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aba400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbc1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6c78c r4:85a6c400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6c78c r4:859f5880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aba400 r8:859f58ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5880 r8:8027ed34 r7:ecde1e60 r6:859f7e80 r5:85aba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdedfb0 to 0xecdedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596ddc0 INFO: task kworker/0:991:6366 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c0ccd000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:992 state:D stack:0 pid:6368 tgid:6368 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf5e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eccb7000 r10:61c88647 r9:8493b000 r8:859f592c r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8596dd00 INFO: task kworker/0:992:6368 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c0ccd000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:620:6369 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:620 state:D stack:0 pid:6369 tgid:6369 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf1e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecdf1fb0 to 0xecdf1ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe06b9d20 to 0xe06b9d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) task:kworker/0:993 state:D stack:0 pid:6372 tgid:6372 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde9e08 r4:00000000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a050c0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:847da200 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:994:6374 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:994 state:D stack:0 pid:6374 tgid:6374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdf9d84 r8:00000002 r7:60000013 r6:ecdf9d8c r5:8493d400 r4:8493d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a055c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece03000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6d78c r4:85a6d400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6d78c r4:859f5b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493d400 r8:859f5bac r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5b80 r8:8027ed34 r7:ecde9e60 r6:859f5c00 r5:8493d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdf9fb0 to 0xecdf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a050c0 INFO: task kworker/0:994:6374 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c11be000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 r4:e06b9dc0 r5:00001000 r4:dfacd000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:995:6376 blocked for more than 479 seconds. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a058c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece1b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6df8c r4:85a6dc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6df8c r4:859f5c80 r10:61c88647 r9:8493e000 r8:859f5cac r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5c80 r8:8027ed34 r7:ecdf9e60 r6:859f5d00 r5:8493e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece01fb0 to 0xece01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a05440 INFO: task kworker/0:995:6376 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece0de08 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:996:6378 is blocked on a mutex likely owned by task kworker/1:224:3809. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493a400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece33000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6e78c r4:85a6e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6e78c r4:859f5e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493a400 r8:859f5eac r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5e80 r8:8027ed34 r7:ece01e60 r6:859f5f00 r5:8493a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece19fb0 to 0xece19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a05740 INFO: task kworker/0:997:6381 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c17fd000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:998 state:D stack:0 pid:6382 tgid:6382 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:85ae0000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 r4:859f5f80 5fa0: 00000000 00000000 00000000 00000000 Call trace: r5:800b0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85ae0c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece31e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05d00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece3f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6eb8c r4:85a6e800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6eb8c r4:85a12080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae0c00 r8:85a120ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a12080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a12080 r8:8027ed34 r7:ece19e60 r6:85a12100 r5:85ae0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece31fb0 to 0xece31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a05980 INFO: task kworker/0:999:6384 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c1e7c000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ece49d84 r8:00000002 r7:60000113 r6:ece49d8c r5:85ae2400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05fc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece57000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6f38c r4:85a6f000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6f38c r4:85a12280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae2400 r8:85a122ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a12280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a12280 r8:8027ed34 r7:ece3de60 r6:85a12300 r5:85ae2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece49fb0 to 0xece49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a05f00 INFO: task kworker/0:1001:6388 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c23af000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe06b9fb0 to 0xe06b9ff8) Not tainted 6.15.0-syzkaller #0 r5:85ae3000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece55e08 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:85a05e40 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece6dd84 r8:00000002 r7:60000013 r6:ece6dd8c r5:85ae3c00 r4:85ae3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ae3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a16380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece73000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6fb8c r4:85a6f800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6fb8c r4:85a12480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae3c00 r8:85a124ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a12480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a12480 r8:8027ed34 r7:ece55e60 r6:85a12500 r5:85ae3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece6dfb0 to 0xece6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a16000 INFO: task kworker/0:1003:6391 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c2af7000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a6ff8c r4:85a6fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: c2af7000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1005:6395 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1005 state:D stack:0 pid:6395 tgid:6395 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1007:6400 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1007 state:D stack:0 pid:6400 tgid:6400 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece95d84 r8:00000002 r7:60000113 r6:ece95d8c r5:85ae6c00 r4:85ae6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ae6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a16b00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceaf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85a16640 Exception stack(0xe06b9d20 to 0xe06b9d68) [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1008:6401 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1008 state:D stack:0 pid:6401 tgid:6401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece89d84 r8:00000002 r7:60000113 r6:ece89d8c r5:85ae8000 r4:85ae8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ae8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a16900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecea3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85a12980 Exception stack(0xece89fb0 to 0xece89ff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1009:6404 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:85ae8c00 r5:85ae8c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85ae8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 r5:85a7d78c r4:85a7d400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a16ac0 INFO: task kworker/0:1009:6404 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c3489000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1010:6406 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1010 state:D stack:0 pid:6406 tgid:6406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eceadd84 r8:00000002 r7:60000013 r6:eceadd8c r5:85aea400 r4:85aea400 r5:85aea400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a16ac0 r10:61c88647 r9:85aea400 r8:85a12bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a16a00 Call trace: 9d60: 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85a7ef8c r4:85a12c80 Exception stack(0xecd3dfb0 to 0xecd3dff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1012:6409 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1012 state:D stack:0 pid:6409 tgid:6409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd55d84 r8:00000002 r7:60000113 r6:ecd55d8c r5:85ae9800 r4:85ae9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ae9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b14040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae9800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7db8c r4:85a7d800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a7db8c r4:85a12d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae9800 r8:85a12dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a12d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a12d80 r8:8027ed34 r7:ecd3de60 r6:85a12e00 r5:85ae9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd55fb0 to 0xecd55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a16b40 INFO: task kworker/0:1012:6409 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c3fd1000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ccb40 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b14280 r7:dddced40 r6:83018000 r5:85a7df8c r4:85a12e80 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1014:6413 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1014 state:D stack:0 pid:6413 tgid:6413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecec5d84 r8:00000002 r7:60000113 r6:ecec5d8c r5:85aed400 r4:85aed400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aed400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b14600 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aed400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8fd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06b9d20 to 0xe06b9d68) r4:82ac11e4 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe06b9fb0 to 0xe06b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:1015 state:D stack:0 pid:6416 tgid:6416 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:00001000 r4:ebc09000 r7:dddced40 r6:83018000 r5:85a7eb8c r4:85b16100 r10:00000000 r9:85b16100 r8:8027ed34 r7:ecd3de60 r6:859f7f80 r5:85abbc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b14480 INFO: task kworker/0:1015:6416 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c3fd1000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1016:6418 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1016 state:D stack:0 pid:6418 tgid:6418 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eced9d84 r8:00000002 r7:60000113 r6:eced9d8c r5:85ab8000 r4:85ab8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ab8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b14a40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7f38c r4:85a7f000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a7f38c r4:85b16180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab8000 r8:85b161ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b16180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b16180 r8:8027ed34 r7:ecd3de60 r6:85b21000 r5:85ab8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced9fb0 to 0xeced9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06b9d20 to 0xe06b9d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8501378c r4:85013400 r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b14bc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d20: c49a4000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1018:6422 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1018 state:D stack:0 pid:6422 tgid:6422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecee1d84 r8:00000002 r7:60000113 r6:ecee1d8c r5:85abd400 r4:85abd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85abd400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a16b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85abd400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec98f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a80b8c r4:85a80800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a80b8c r4:85b16280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85abd400 r8:85b162ac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 task:kworker/0:1019 state:D stack:0 pid:6425 tgid:6425 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b14b40 INFO: task kworker/0:1019:6425 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c4ff6000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:1020:6427 blocked for more than 479 seconds. r5:85abec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b14e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85abec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7ff8c r4:85a7fc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a7ff8c r4:85b16380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85abec00 r8:85b163ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b16380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b16380 r8:8027ed34 r7:ecee1e60 r6:85b21200 r5:85abec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef1fb0 to 0xecef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b149c0 INFO: task kworker/0:1020:6427 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe06b9d20 to 0xe06b9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe06b9fb0 to 0xe06b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85ab9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecefde08 r9:83018005 r8:85ab9800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 r7:dddced40 r6:83018000 r5:85a8038c r4:85b16400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab9800 r8:85b1642c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b16400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b16400 r8:8027ed34 r7:ecee1e60 r6:85b21280 r5:85ab9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecefdfb0 to 0xecefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b14c00 INFO: task kworker/0:1021:6430 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c53c0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0