Extracting prog: 11m18.318760575s Minimizing prog: 1h15m43.608717309s Simplifying prog options: 0s Extracting C: 8m39.908970122s Simplifying C: 58m51.438221571s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000004000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r0}, 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD-bpf$BPF_RAW_TRACEPOINT_OPEN detailed listing: executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000004000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r0}, 0x10) program crashed: INFO: task hung in _vm_unmap_aliases single: successfully extracted reproducer found reproducer with 2 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000004000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD detailed listing: executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000004000000000000003b810000850000006d000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 2h34m33.274718376s repro crashed as (corrupted=false): INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:8323e000 r4:8323e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516a8c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5a9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ca238c r4:85ca2000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ca238c r4:830b8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ed34 r7:df819e48 r6:830b8480 r5:8323e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830b7180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/0:2:43 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df911d84 r8:00000002 r7:60000013 r6:df911d8c r5:832eb000 r4:832eb000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832eb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df911e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b86e00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdff000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499d38c r4:8499d000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499d38c r4:83363280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832eb000 r8:833632ac r7:82804d40 r6:dddced40 r5:dddced60 r4:83363280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363280 r8:8027ed34 r7:df83de60 r6:832a1400 r5:832eb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf911fb0 to 0xdf911ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8335fb00 INFO: task kworker/0:2:43 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/1:2:96 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:96 tgid:96 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:832fb000 r4:832fb000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832fb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856bd600 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec89b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474738c r4:84747000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8474738c r4:832b7a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832fb000 r8:832b7aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:832b7a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832b7a80 r8:8027ed34 r7:df879e60 r6:832b7b00 r5:832fb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:832bcbc0 INFO: task kworker/1:2:96 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/1:0:3096 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:3096 tgid:3096 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df849d84 r8:00000002 r7:60000013 r6:df849d8c r5:839c9800 r4:839c9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:839c9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df849e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d9e40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:839c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f11b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed995000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cc2b8c r4:85cc2800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85cc2b8c r4:847bb580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:839c9800 r8:847bb5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847bb580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847bb580 r8:8027ed34 r7:eb0c9e60 r6:849cc780 r5:839c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf849fb0 to 0xdf849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:832b2c40 INFO: task kworker/1:0:3096 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/1:6:3119 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3119 tgid:3119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df971d84 r8:00000002 r7:60000113 r6:df971d8c r5:844c0c00 r4:844c0c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844c0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df971e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85628c80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca35000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858d538c r4:858d5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858d538c r4:83349880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c0c00 r8:833498ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83349880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83349880 r8:8027ed34 r7:df9ede60 r6:849cce00 r5:844c0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf971fb0 to 0xdf971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477f400 INFO: task kworker/1:6:3119 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/1:7:3120 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3120 tgid:3120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9fdd84 r8:00000002 r7:60000013 r6:df9fdd8c r5:832e8c00 r4:832e8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832e8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9fde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b86180 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:832e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0513000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b5cb8c r4:84b5c800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b5cb8c r4:83349800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832e8c00 r8:8334982c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83349800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83349800 r8:8027ed34 r7:df971e60 r6:849cca80 r5:832e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9fdfb0 to 0xdf9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477f400 INFO: task kworker/1:7:3120 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/0:3:3121 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3121 tgid:3121 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa01d84 r8:00000002 r7:60000113 r6:dfa01d8c r5:83aa6c00 r4:83aa6c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa6c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa01e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85154480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aa6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c2b8c r4:850c2800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c2b8c r4:849cce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa6c00 r8:849cceac r7:82804d40 r6:dddced40 r5:dddced60 r4:849cce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849cce80 r8:8027ed34 r7:df911e60 r6:847bbf80 r5:83aa6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa01fb0 to 0xdfa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d680 INFO: task kworker/0:3:3121 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/0:4:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa05d84 r8:00000002 r7:60000113 r6:dfa05d8c r5:83aa6000 r4:83aa6000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa6000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae7140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83aa6000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0097000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b5e38c r4:84b5e000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b5e38c r4:8431c280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa6000 r8:8431c2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8431c280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8431c280 r8:8027ed34 r7:dfa01e60 r6:83c0e680 r5:83aa6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d680 INFO: task kworker/0:4:3122 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/0:5:3125 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9f9d84 r8:00000002 r7:60000013 r6:df9f9d8c r5:84193000 r4:84193000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84193000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba06c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84193000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b5e78c r4:84b5e400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b5e78c r4:830cd100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84193000 r8:830cd12c r7:82804d40 r6:dddced40 r5:dddced60 r4:830cd100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd100 r8:8027ed34 r7:dfa01e60 r6:830cd080 r5:84193000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478de40 INFO: task kworker/0:5:3125 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/1:8:3126 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:84191800 r4:84191800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84191800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847e51c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84191800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b2cf8c r4:84b2cc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b2cf8c r4:83349f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84191800 r8:83349fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83349f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83349f80 r8:8027ed34 r7:df971e60 r6:840e4380 r5:84191800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477f600 INFO: task kworker/1:8:3126 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3128 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:83308000 r4:83308000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83308000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b08ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83308000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0509000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c078c r4:850c0400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c078c r4:840e4300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308000 r8:840e432c r7:82804d40 r6:dddced40 r5:dddced60 r4:840e4300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:840e4300 r8:8027ed34 r7:dfa01e60 r6:830b8780 r5:83308000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478dd80 INFO: task kworker/0:6:3128 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3131 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:8325a400 r4:8325a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8325a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ee2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8325a400 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07db000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c238c r4:850c2000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c238c r4:84587980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8325a400 r8:845879ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84587980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84587980 r8:8027ed34 r7:dfa01e60 r6:830b8700 r5:8325a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d240 INFO: task kworker/0:7:3131 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3134 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:83ffc800 r4:83ffc800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fae80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ffc800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab2f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c338c r4:850c3000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:850c338c r4:84780000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffc800 r8:8478002c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780000 r8:8027ed34 r7:dfa01e60 r6:830b8680 r5:83ffc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847c0640 INFO: task kworker/0:8:3134 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92197000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3135 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa5dd84 r8:00000002 r7:60000113 r6:dfa5dd8c r5:83ffd400 r4:83ffd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83ffd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a2140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83ffd400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473a78c r4:8473a400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8473a78c r4:84780080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ffd400 r8:847800ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84780080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780080 r8:8027ed34 r7:dfa59e60 r6:830b8600 r5:83ffd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478d300 INFO: task kworker/0:9:3135 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3138 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3138 tgid:3138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:8324a400 r4:8324a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851eee40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8324a400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f5f8c r4:852f5c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f5f8c r4:84780100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:8478012c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780100 r8:8027ed34 r7:dfa5de60 r6:84585d80 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cf100 INFO: task kworker/0:10:3138 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3139 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa71d84 r8:00000002 r7:60000013 r6:dfa71d8c r5:8389ec00 r4:8389ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8389ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa71e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a3c40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8389ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa4f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852da78c r4:852da400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852da78c r4:84780180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8389ec00 r8:847801ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84780180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780180 r8:8027ed34 r7:dfa65e60 r6:84585e00 r5:8389ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa71fb0 to 0xdfa71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cf040 INFO: task kworker/0:11:3139 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3141 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3141 tgid:3141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa75d84 r8:00000002 r7:60000013 r6:dfa75d8c r5:84003c00 r4:84003c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84003c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:84003c00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3142 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:832f8c00 r4:832f8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:832f8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a8e40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:832f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa77000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f638c r4:852f6000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:852f638c r4:84780200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f8c00 r8:8478022c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780200 r8:8027ed34 r7:dfa65e60 r6:832b7c00 r5:832f8c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) Exception stack(0xe0421fb0 to 0xe0421ff8) r4:83a9b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a9b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa89e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84795e80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a9b000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec673000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84232f8c r4:84232c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84232f8c r4:84787000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a9b000 r8:8478702c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84787000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787000 r8:8027ed34 r7:df971e60 r6:84787080 r5:83a9b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa89fb0 to 0xdfa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8477fc00 INFO: task kworker/1:10:3146 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0421d20 to 0xe0421d68) r5:00001000 r4:eda69000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:83b65400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa99e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85462400 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b65400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf19000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8473bf8c r4:8473bc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8473bf8c r4:84780300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b65400 r8:8478032c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780300 r8:8027ed34 r7:dfa95e60 r6:84787180 r5:83b65400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa99fb0 to 0xdfa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cf680 INFO: task kworker/0:14:3149 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:83b63c00 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855417c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b63c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa81000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8474438c r4:84744000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8474438c r4:84780380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b63c00 r8:847803ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84780380 r8:8027ed34 r7:dfa99e60 r6:84787200 r5:83b63c00 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) INFO: task kworker/0:16:3153 blocked for more than 451 seconds. r5:83b66000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83b66000 r8:8478042c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780400 r8:8027ed34 r7:dfaa1e60 r6:84787280 r5:83b66000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaadfb0 to 0xdfaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cf800 INFO: task kworker/0:16:3153 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) INFO: task kworker/0:17:3155 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:83b66c00 r4:83b66c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83b66c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8554d7c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83b66c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead2b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85420b8c r4:85420800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85420b8c r4:84780480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdfab9fb0 to 0xdfab9ff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:844d8c00 r4:844d8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85561d80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b478c r4:855b4400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b478c r4:84780500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d8c00 r8:8478052c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780500 r4:00000001 r4:847cfd00 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfacde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847cfcc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0483000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85422f8c r4:85422c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85422f8c r4:84780580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d9800 r8:847805ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84780580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780580 r8:8027ed34 r7:dfac9e60 r6:84787400 r5:844d9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfacdfb0 to 0xdfacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cfc40 INFO: task kworker/0:19:3158 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:20 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cfc80 INFO: task kworker/0:20:3160 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:847cfe40 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85646f80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb413000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b4f8c r4:855b4c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b4f8c r4:84780700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844dc800 r8:8478072c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780700 r8:8027ed34 r7:dfaf1e60 r6:84787580 r5:844dc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf5fb0 to 0xdfaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 r4:847cff40 Workqueue: events bpf_prog_free_deferred [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:eda69000 r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:844d8000 r4:844d8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844d8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d7000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8dd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b5f8c r4:855b5c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:844dbc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844dbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d7b80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b638c r4:855b6000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:855b638c r4:84780800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844dbc00 r8:8478082c r7:82804d40 r6:dddced40 r5:dddced60 r4:84780800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780800 r8:8027ed34 r7:dfaf1e60 r6:84787680 r5:844dbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857be5c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857df9c0 r7:dddced40 r6:83018000 r5:857a478c r4:84780980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3174 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3174 tgid:3174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:844dd400 r4:844dd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844dd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85873540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb837000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8582178c r4:85821400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8582178c r4:84780a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844dd400 r8:84780aac r7:82804d40 r6:dddced40 r5:dddced60 r4:84780a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84780a80 r8:8027ed34 r7:dfaf1e60 r6:84787700 r5:844dd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84796800 INFO: task kworker/0:27:3174 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:eda69000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:8582338c r4:84780b00 Exception stack(0xdfb45fb0 to 0xdfb45ff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3181 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb31d84 r8:00000002 r7:60000013 r6:dfb31d8c r5:844dec00 r4:844dec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844dec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85142bc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca43000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599538c r4:85995000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8599538c r4:84787800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844dec00 r8:8478782c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84787800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787800 r8:8027ed34 r7:df971e60 r6:84787880 r5:844dec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847957c0 INFO: task kworker/1:11:3181 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847957c0 INFO: task kworker/1:12:3182 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d4778c r4:85d47400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3184 tgid:3184 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:844c9800 r4:844c9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844c9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84787a00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:00001000 r4:ed5c3000 r10:61c88647 r9:84196c00 r8:84780bac r7:82804d40 r6:dddced40 r5:dddced60 r4:84796c80 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829187f4 r9:dfb6dd84 r8:00000002 r7:60000113 r6:dfb6dd8c r5:84194800 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85ca2f8c r4:85ca2c00 r10:00000000 r9:84780c80 r8:8027ed34 r7:dfb51e60 r6:84780d00 r5:84194800 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85d4778c r4:85d47400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 INFO: task kworker/1:15:3192 blocked for more than 451 seconds. r5:84193c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856e3000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84193c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85acbf8c r4:85acbc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85acbf8c r4:84787c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84193c00 r8:84787c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84787c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787c00 r8:8027ed34 r7:dfb85e60 r6:84780e00 r5:84193c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8442e3c0 INFO: task kworker/1:15:3192 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3193 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb99d84 r8:00000002 r7:60000113 r6:dfb99d8c r5:83309800 r4:83309800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83309800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85c30b8c r4:84787c80 Exception stack(0xdfb99fb0 to 0xdfb99ff8) Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3195 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:83aa9800 r4:83aa9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aa9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857bd9c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aa9800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ed000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599678c r4:85996400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8599678c r4:84787d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aa9800 r8:84787d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84787d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787d00 r8:8027ed34 r7:dfb99e60 r6:84780f00 r5:83aa9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:85d4778c r4:85d47400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:85996f8c r4:84787d80 Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:83aae000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:dfb5d000 r10:61c88647 r9:83aae000 r8:84787e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8442e800 Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3201 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbd1d84 r8:00000002 r7:60000013 r6:dfbd1d8c r5:83aaa400 r4:83aaa400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aaa400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:83aaa400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 r10:00000000 r9:84787e80 r8:8027ed34 r7:dfb99e60 r6:8478c080 r5:83aaa400 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:dfbddd84 r8:00000002 r7:60000013 r6:dfbddd8c r5:83aabc00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r5:00001000 r4:ed05f000 r10:61c88647 r9:83aabc00 r8:84787fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8442ea80 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0421dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3205 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbe5d84 r8:00000002 r7:60000113 r6:dfbe5d8c r5:83aad400 r4:83aad400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83aad400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85689980 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83aad400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed321000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bfc78c r4:85bfc400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bfc78c r4:84787f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aad400 r8:84787f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84787f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r4:00000000 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0421fb0 to 0xe0421ff8) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:838c4800 r4:838c4800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:838c4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d6900 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:838c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed20d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bfcf8c r4:85bfcc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bfcf8c r4:84787b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:838c4800 r8:84787b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84787b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84787b00 r8:8027ed34 r7:dfbe5e60 r6:8478c200 r5:838c4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85bfcb8c r4:84783000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85bfdf8c r4:85bfdc00 r4:84783080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783080 r8:8027ed34 r7:dfc05e60 r6:8478c300 r5:838c6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84796980 INFO: task kworker/1:25:3211 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3213 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc25d84 r8:00000002 r7:60000113 r6:dfc25d8c r5:84196000 r4:84196000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84196000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d6180 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84196000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed29b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bfd38c r4:85bfd000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bfd38c r4:84783100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84196000 r8:8478312c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783100 r8:8027ed34 r7:dfc11e60 r6:8478c380 r5:84196000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a8080 INFO: task kworker/1:26:3213 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:27 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85c50f8c r4:84783180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3217 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc41d84 r8:00000002 r7:60000113 r6:dfc41d8c r5:84a68000 r5:84a68000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84a69800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) Workqueue: events bpf_prog_free_deferred 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:e0421dc0 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3221 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc5dd84 r8:00000002 r7:60000113 r6:dfc5dd8c r5:84a6a400 r4:84a6a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc5de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fb700 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eced7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c5238c r4:85c52000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c5238c r4:84783300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6a400 r8:8478332c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783300 r8:8027ed34 r7:dfc11e60 r6:8478c580 r5:84a6a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc5dfb0 to 0xdfc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a8540 INFO: task kworker/1:30:3221 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3223 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829187f4 r9:dfb61d84 r8:00000002 r7:60000013 r6:dfb61d8c r5:844c8000 r4:844c8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844c8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb61e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8442ed00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed2cd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bfe38c r4:85bfe000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bfe38c r4:84783400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c8000 r8:8478342c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783400 r8:8027ed34 r7:dfc11e60 r6:84783480 r5:844c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb61fb0 to 0xdfb61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a8580 INFO: task kworker/1:31:3223 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3226 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:844ca400 r4:844ca400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844ca400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d9400 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f107000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed869000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bffb8c r4:85bff800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bffb8c r4:84783500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ca400 r8:8478352c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783500 r8:8027ed34 r7:dfb61e60 r6:84783580 r5:844ca400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a8a40 INFO: task kworker/1:32:3226 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3227 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:844cb000 r4:844cb000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844cb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516a600 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4d3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ca1f8c r4:85ca1c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85ca1f8c r4:84783600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844cb000 r8:8478362c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783600 r8:8027ed34 r7:dfc61e60 r6:84783680 r5:844cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a8a40 INFO: task kworker/1:33:3227 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:34 state:D stack:0 pid:3231 tgid:3231 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018205 r8:844cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 r10:61c88647 r9:844cbc00 r8:8478372c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3232 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3232 tgid:3232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc89d84 r8:00000002 r7:60000013 r6:dfc89d8c r5:844cc800 r4:844cc800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844cc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d9500 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:844cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f109000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed875000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85bfff8c r4:85bffc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85bfff8c r4:84783800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844cc800 r8:8478382c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783800 r8:8027ed34 r7:dfc75e60 r6:84783880 r5:844cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) INFO: task kworker/1:36:3234 blocked for more than 451 seconds. r5:844cd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:85bff78c r4:84783900 r10:61c88647 r9:844cd400 r8:8478392c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783900 r8:8027ed34 r7:dfc89e60 r6:84783980 r5:844cd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc91fb0 to 0xdfc91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a8f40 INFO: task kworker/1:36:3234 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:00001000 r4:ed953000 r10:61c88647 r9:844ce000 r8:84783a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae0100 task:kworker/1:38 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:85bff38c r4:85bff000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f2100 INFO: task kworker/1:38:3237 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/1:39:3239 blocked for more than 451 seconds. r4:843b8c00 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8423a78c r4:84783c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0421fb0 to 0xe0421ff8) Not tainted 6.15.0-syzkaller #0 r5:843b9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:84239f8c r4:84783d00 r10:61c88647 r9:843b9800 r8:84783d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783d00 r8:8027ed34 r7:dfc9de60 r6:84783d80 r5:843b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca5fb0 to 0xdfca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f2800 INFO: task kworker/1:40:3247 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c5e08 r9:83018205 r8:843ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f111000 r10:61c88647 r9:843ba400 r8:84783e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 1d60: 80000013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85d4778c r4:85d47400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d9b00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:843bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f115000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed97b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85be7f8c r4:85be7c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85be7f8c r4:84783f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843bb000 r8:84783f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84783f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84783f00 r8:8027ed34 r7:df9c5e60 r6:84783f80 r5:843bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa45fb0 to 0xdfa45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f2800 INFO: task kworker/1:42:3249 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r9:83018205 r8:843bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f113000 r10:61c88647 r9:843bbc00 r8:8488b02c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847f2800 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3252 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:843bc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:85c1078c r4:85c10400 r10:00000000 r9:8488b100 r8:8027ed34 r7:dfa45e60 r6:8488b180 r5:843bc800 Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847f2800 INFO: task kworker/1:44:3252 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3255 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829187f4 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:843be000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85ca2b8c r4:8478c680 r4:00000001 r4:848c80c0 Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae0100 task:kworker/0:32 state:D stack:0 pid:3256 tgid:3256 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516ad00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5ef000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ca338c r4:85ca3000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ca338c r4:8478c700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843bec00 r8:8478c72c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478c700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478c700 r8:8027ed34 r7:dfb6de60 r6:8488b380 r5:843bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c80c0 INFO: task kworker/0:32:3256 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:dfb05d84 r8:00000002 r7:60000113 r6:dfb05d8c r5:843b8000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:e0421dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:dfcb9d84 r8:00000002 r7:60000113 r6:dfcb9d8c r5:84199800 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84199800 r8:8478c82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478c800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478c800 r8:8027ed34 r7:dfb05e60 r6:8488b480 r5:84199800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb9fb0 to 0xdfcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c85c0 INFO: task kworker/0:34:3262 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:dfcbdd84 r8:00000002 r7:60000113 r6:dfcbdd8c r5:8419a400 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85ca3f8c r4:8478c880 Exception stack(0xdfcbdfb0 to 0xdfcbdff8) Workqueue: events bpf_prog_free_deferred 1d60: 80000013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:848c8880 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3266 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcc9d84 r8:00000002 r7:60000113 r6:dfcc9d8c r5:8419b000 r4:8419b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8419b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84addf40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8419b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5dd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cac38c r4:85cac000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cac38c r4:8478c980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8419b000 r8:8478c9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8478c980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478c980 r8:8027ed34 r7:dfcc5e60 r6:8488b600 r5:8419b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc9fb0 to 0xdfcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c8880 INFO: task kworker/0:37:3266 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 925ff000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3268 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcd1d84 r8:00000002 r7:60000113 r6:dfcd1d8c r5:8419c800 r4:8419c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8419c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8419c800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceef000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cacf8c r4:85cacc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cacf8c r4:8478ca00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8419c800 r8:8478ca2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ca00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ca00 r8:8027ed34 r7:dfcc5e60 r6:8488b680 r5:8419c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd1fb0 to 0xdfcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c89c0 INFO: task kworker/0:38:3268 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8419bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d6d80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8419bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd5f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cacb8c r4:85cac800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cacb8c r4:8478ca80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8419bc00 r8:8478caac r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ca80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478ca80 r8:8027ed34 r7:dfcd1e60 r6:8488b700 r5:8419bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd9fb0 to 0xdfcd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c8b40 INFO: task kworker/0:39:3270 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84ae2180 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:40:3272 blocked for more than 451 seconds. task:kworker/0:40 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84198000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:84198000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84198000 r8:8478cb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478cb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478cb00 r8:8027ed34 r7:dfcd1e60 r6:8488b780 r5:84198000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce1fb0 to 0xdfce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c8f00 INFO: task kworker/0:40:3272 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3274 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfce9d84 r8:00000002 r7:60000113 r6:dfce9d8c r5:8419d400 r4:8419d400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8419d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516c1c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8419d400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf65000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cad38c r4:85cad000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cad38c r4:8478cb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8419d400 r8:8478cbac r7:82804d40 r6:dddced40 r5:dddced60 r4:8478cb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478cb80 r8:8027ed34 r7:dfce1e60 r6:8488b800 r5:8419d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce9fb0 to 0xdfce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:848c8d40 INFO: task kworker/0:41:3274 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r5:8419e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3278 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3278 tgid:3278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcf9d84 r8:00000002 r7:60000013 r6:dfcf9d8c r5:8419ec00 r4:8419ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8419ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516cbc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8419ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed45d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cafb8c r4:85caf800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cafb8c r4:8478cc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:44:3282 blocked for more than 451 seconds. r5:843b0000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ed31f000 r10:61c88647 r9:843b0000 r8:8478cd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:849b4a40 Call trace: 1d60: 80000013 ffffffff r4:e0421dc0 r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3284 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd0dd84 r8:00000002 r7:60000013 r6:dfd0dd8c r5:843b1800 r4:843b1800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843b1800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd0de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516cf00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4eb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cb078c r4:85cb0400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cb078c r4:8478cd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843b1800 r8:8478cdac r7:82804d40 r6:dddced40 r5:dddced60 r4:8478cd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478cd80 r8:8027ed34 r7:dfcf9e60 r6:8488bb00 r5:843b1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd0dfb0 to 0xdfd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84526240 INFO: task kworker/0:45:3284 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3286 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd15d84 r8:00000002 r7:60000013 r6:dfd15d8c r5:843b2400 r4:843b2400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843b2400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516ce00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed4a3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:843b2400 r8:8478ce2c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3288 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3288 tgid:3288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd1dd84 r8:00000002 r7:60000013 r6:dfd1dd8c r5:843b4800 r4:843b4800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843b4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd1de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516cc40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed47b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85caff8c r4:85cafc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85caff8c r4:8478ce80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843b4800 r8:8478ceac r7:82804d40 r6:dddced40 r5:dddced60 r4:8478ce80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfa0: 00000000 00000000 00000000 00000000 Call trace: 1d60: 80000013 ffffffff r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 Exception stack(0xe0421fb0 to 0xe0421ff8) INFO: task kworker/0:48:3290 blocked for more than 451 seconds. r5:843b3c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ed70d000 r10:61c88647 r9:843b3c00 r8:8478cf2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8478cf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8478cf00 r8:8027ed34 r7:dfcf9e60 r6:8488bc80 r5:843b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd29fb0 to 0xdfd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:845261c0 INFO: task kworker/0:48:3290 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:843b3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516cac0 r10:61c88647 r9:843b3000 r8:8478cfac r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:49:3292 is blocked on a mutex likely owned by task kworker/0:176:3656. r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:50:3294 blocked for more than 451 seconds. r5:843b5400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3296 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3296 tgid:3296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb7dd84 r8:00000002 r7:60000013 r6:dfb7dd8c r5:843b6000 r4:843b6000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:843b6000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516c8c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:843b6000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3eb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85caef8c r4:85caec00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85caef8c r4:849ef080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843b6000 r8:849ef0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ef080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ef080 r8:8027ed34 r7:dfd29e60 r6:8488be00 r5:843b6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84526740 INFO: task kworker/0:51:3296 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:843b6c00 r4:829187f0 r4:00000000 r9:83018005 r8:843b6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 r4:849ef100 dfa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84009800 r5:84009800 r4:829187f0 r4:00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516c7c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84009800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3cd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85caeb8c r4:85cae800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85caeb8c r4:849ef180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84009800 r8:849ef1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ef180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ef180 r8:8027ed34 r7:dfd29e60 r6:8488bf00 r5:84009800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd5fb0 to 0xdfbd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84526a00 INFO: task kworker/0:53:3301 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:54:3303 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:54 state:D stack:0 pid:3303 tgid:3303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbf5d84 r8:00000002 r7:60000013 r6:dfbf5d8c r5:8400a400 r4:8400a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8400a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85cae78c r4:849ef200 5fa0: 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Not tainted 6.15.0-syzkaller #0 r5:84008000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae3c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84008000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5ad000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cb178c r4:85cb1400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cb178c r4:849ef280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84008000 r8:849ef2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ef280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ef280 r8:8027ed34 r7:dfd29e60 r6:84271000 r5:84008000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc29fb0 to 0xdfc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84526c40 INFO: task kworker/0:55:3305 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8400bc00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r5:00001000 r4:ed56f000 r10:61c88647 r9:8400bc00 r8:849ef32c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:57:3309 blocked for more than 451 seconds. r5:8400c800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd55e08 r5:00001000 r4:ed6e7000 r10:61c88647 r9:8400c800 r8:849ef3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8464f780 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:58:3312 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:58 state:D stack:0 pid:3312 tgid:3312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd61d84 r8:00000002 r7:60000113 r6:dfd61d8c r5:8400b000 r4:8400b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8400b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd61e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae5c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8400b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6f5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cb1f8c r4:85cb1c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cb1f8c r4:849ef400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8400b000 r8:849ef42c r7:82804d40 r6:dddced40 r5:dddced60 r4:849ef400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ed703000 r7:dddced40 r6:83018000 r5:85cb238c r4:849ef480 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:61:3317 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:61 state:D stack:0 pid:3317 tgid:3317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd75d84 r8:00000002 r7:60000113 r6:dfd75d8c r5:8400e000 r4:8400e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8400e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd75e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852ae840 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8400e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed71b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85cb2b8c r4:85cb2800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85cb2b8c r4:849ef580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8400e000 r8:849ef5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849ef580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ef580 r8:8027ed34 r7:dfd71e60 r6:84271300 r5:8400e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd75fb0 to 0xdfd75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:844292c0 INFO: task kworker/0:61:3317 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:175:3655 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:175 state:D stack:0 pid:3655 tgid:3655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e041dd84 r8:00000002 r7:60000113 r6:e041dd8c r5:8482bc00 r4:8482bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8482bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e041de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b86cc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffb5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499db8c r4:8499d800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499db8c r4:84ae2080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482bc00 r8:84ae20ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2080 r8:8027ed34 r7:e00bde60 r6:84ae2100 r5:8482bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe041dfb0 to 0xe041dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 INFO: task kworker/0:175:3655 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:101:3662 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:101 state:D stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0419d84 r8:00000002 r7:60000113 r6:e0419d8c r5:8482ec00 r4:8482ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8482ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0419e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1600 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffdb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a578c r4:849a5400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a578c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 INFO: task kworker/1:101:3662 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:177:3667 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:177 state:D stack:0 pid:3667 tgid:3667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:8482a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:e0421dc0 r5:00001000 r4:eda69000 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:103:3669 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:103 state:D stack:0 pid:3669 tgid:3669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0439d84 r8:00000002 r7:60000113 r6:e0439d8c r5:84ad6c00 r4:84ad6c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ad6c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0439e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ad6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfffd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a5f8c r4:849a5c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a5f8c r4:84ae4000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad6c00 r8:84ae402c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84a28000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:849a5b8c r4:849a5800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:105:3673 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:105 state:D stack:0 pid:3673 tgid:3673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0449d84 r8:00000002 r7:60000013 r6:e0449d8c r5:84a2a400 r4:84a2a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0449e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1200 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0005000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a638c r4:849a6000 r7:ddde2d40 r6:83018200 r5:849a638c r4:84ae4100 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0451d84 r8:00000002 r7:60000113 r6:e0451d8c r5:84a29800 r4:84a29800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a29800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0451e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a29800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df8ff000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a6b8c r4:849a6800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a6b8c r4:84ae4200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a29800 r8:84ae422c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae4200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4200 r8:8027ed34 r7:e0449e60 r6:84ae2700 r5:84a29800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0451fb0 to 0xe0451ff8) 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:107:3676 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0455d84 r8:00000002 r7:60000113 r6:e0455d8c r5:84a2b000 r4:84a2b000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0455e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1380 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2b000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0023000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:849a678c r4:84ae4280 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bd0 r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:108:3684 blocked for more than 452 seconds. r5:84a28c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0479e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ae4180 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 r5:85d4778c r4:85d47400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:109:3686 blocked for more than 452 seconds. r5:84a2d400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e047de08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:110:3687 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:110 state:D stack:0 pid:3687 tgid:3687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0481d84 r8:00000002 r7:60000113 r6:e0481d8c r5:84a2bc00 r4:84a2bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0481e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1800 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84ae1dc0 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 task:kworker/1:111 state:D stack:0 pid:3688 tgid:3688 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a2ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0489e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1a00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc0b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a7f8c r4:849a7c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a7f8c r4:84ae4400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2ec00 r8:84ae442c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:111:3688 is blocked on a mutex likely owned by task kworker/0:176:3656. r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e048dd84 r8:00000002 r7:60000113 r6:e048dd8c r5:84a2c800 r4:84a2c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a2c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e048de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1900 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbd9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a7b8c r4:849a7800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a7b8c r4:84ae4480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2c800 r8:84ae44ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae4480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4480 r8:8027ed34 r7:e0489e60 r6:84ae2a00 r5:84a2c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe048dfb0 to 0xe048dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae1dc0 INFO: task kworker/1:112:3690 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:113:3691 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:113 state:D stack:0 pid:3691 tgid:3691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0491d84 r8:00000002 r7:60000113 r6:e0491d8c r5:84ac8000 r4:84ac8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ac8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0491e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1b00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ac8000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc3b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:84b1438c r4:84ae4500 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ac8c00 r5:84ac8c00 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Not tainted 6.15.0-syzkaller #0 r5:84aca400 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e049de08 r5:00001000 r4:dfc97000 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae1dc0 INFO: task kworker/1:115:3694 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:116:3695 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:116 state:D stack:0 pid:3695 tgid:3695 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e04a1d84 r8:00000002 r7:60000113 r6:e04a1d8c r5:84acb000 r4:84acb000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84acb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a1e08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:ddde2d40 r6:83018200 r5:84b14f8c r4:84ae4680 Exception stack(0xe04a1fb0 to 0xe04a1ff8) Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84acc800 r4:829187f0 r4:00000000 r4:00000000 r5:84b1638c r4:84b16000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:118:3698 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:118 state:D stack:0 pid:3698 tgid:3698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e04add84 r8:00000002 r7:60000113 r6:e04add8c r5:84acd400 r4:84acd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84acd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ade08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0e80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84acd400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd79000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84acd400 r8:84ae47ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae0380 r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84ace000 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84ae4800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84acbc00 r5:84acbc00 r4:829187f0 r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0f80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84acbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499cf8c r4:8499cc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8499cf8c r4:84ae4880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84acbc00 r8:84ae48ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae4880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4880 r8:8027ed34 r7:e04a9e60 r6:84ae2e00 r5:84acbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04b9fb0 to 0xe04b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0f80 INFO: task kworker/1:120:3701 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84acec00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0431e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:3707 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:178 state:D stack:0 pid:3707 tgid:3707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84ac9800 r5:84ac9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0b00 r10:61c88647 r9:84ac9800 r8:84ae2f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b86a80 Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:179 state:D stack:0 pid:3709 tgid:3709 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:e002f000 r4:84b8b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84850000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c1e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0083000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499e78c r4:8499e400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499e78c r4:84b8b100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84850000 r8:84b8b12c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b8b100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8b100 r8:8027ed34 r7:e0441e60 r6:84b8b180 r5:84850000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04c1fb0 to 0xe04c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84080 INFO: task kworker/0:180:3712 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:181:3714 blocked for more than 452 seconds. r5:84850c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:182:3716 blocked for more than 452 seconds. r5:84852400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e008f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499eb8c r4:8499e800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499eb8c r4:84b8b300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84852400 r8:84b8b32c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b8b300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8b300 r8:8027ed34 r7:e04c9e60 r6:84b8b380 r5:84852400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04c5fb0 to 0xe04c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84200 INFO: task kworker/0:182:3716 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r5:80000013 r4:80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84853000 r5:84853000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:e0101000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499fb8c r4:8499f800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499fb8c r4:84b8b400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84853000 r8:84b8b42c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b8b400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8b400 r8:8027ed34 r7:e04c9e60 r6:84b8b480 r5:84853000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04cdfb0 to 0xe04cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b843c0 INFO: task kworker/0:183:3718 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:00000000 r5:85d4778c r4:85d47400 r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 Not tainted 6.15.0-syzkaller #0 r5:84853c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae0100 Workqueue: events bpf_prog_free_deferred r5:84854800 r4:829187f0 r4:00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b846c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84854800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00cf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8499f78c r4:8499f400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8499f78c r4:84b8b600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84854800 r8:84b8b62c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b8b600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8b600 r8:8027ed34 r7:e04cde60 r6:84b8b680 r5:84854800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d5fb0 to 0xe04d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84600 INFO: task kworker/0:185:3722 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84855400 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:84856000 r4:829187f0 r4:00000000 r7:dddced40 r6:83018000 r5:84738b8c r4:84b8b800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84856000 r8:84b8b82c r7:82804d40 r6:dddced40 r5:dddced60 r4:84b8b800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8b800 r8:8027ed34 r7:e04d9e60 r6:84b8b880 r5:84856000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e1fb0 to 0xe04e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b84940 INFO: task kworker/0:187:3726 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84ac6000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) Exception stack(0xe0501fb0 to 0xe0501ff8) 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84ac6c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e050de08 r10:00000000 r9:84b8b980 r8:8027ed34 r7:e0501e60 r6:84ae4a00 r5:84ac6c00 r5:80000013 r4:80239bd0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:3732 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0511d84 r8:00000002 r7:60000113 r6:e0511d8c r5:84ac5400 r4:84ac5400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ac5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0511e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:84b8ba00 INFO: task kworker/0:190:3732 is blocked on a mutex likely owned by task kworker/0:176:3656. r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:84ae0100 r5:84ac4800 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 92db9000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:61c88647 r9:84851800 r8:84b8baac r7:82804d40 r6:dddced40 r5:dddced60 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r4:84ae2180 r4:84ae0100 r5:84bd8c00 r4:829187f0 r4:00000000 r10:00000000 r9:84ae4c00 r8:8027ed34 r7:e04a9e60 r6:84b8bb80 r5:84bd8c00 r4:e0421dc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:124 state:D stack:0 pid:3740 tgid:3740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e053dd84 r8:00000002 r7:60000013 r6:e053dd8c r5:84bd9800 r4:84bd9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bd9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e053de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b87600 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bd9800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16b8c r4:84b16800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b16b8c r4:84ae4c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bd9800 r8:84ae4cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae4c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4c80 r8:8027ed34 r7:e0539e60 r6:84b8bc00 r5:84bd9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:192:3743 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 r4:84bda400 r5:84bda400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ba0a00 r10:61c88647 r9:84bda400 r8:84b8bcac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ad8280 Call trace: 1d60: 80000013 ffffffff r4:e0421dc0 r5:00001000 r4:eda69000 r4:84ae2180 1fa0: 00000000 00000000 00000000 00000000 r4:84bdb000 r5:84bdb000 r4:829187f0 r4:00000000 r9:83018205 r8:84bdb000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:126:3746 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:126 state:D stack:0 pid:3746 tgid:3746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0545d84 r8:00000002 r7:60000013 r6:e0545d8c r5:84bdbc00 r4:84bdbc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bdbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0545e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8477f340 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bdbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcbf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b16f8c r4:84b16c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b16f8c r4:84ae4d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bdbc00 r8:84ae4dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe0545fb0 to 0xe0545ff8) Workqueue: events bpf_prog_free_deferred r5:80000013 r4:80239bd0 r4:00000000 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0549d84 r8:00000002 r7:60000013 r6:e0549d8c r5:84bdc800 r4:84bdc800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bdc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0549e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b87240 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bdc800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd07000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1738c r4:84b17000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1738c r4:84ae4e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bdc800 r8:84ae4e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae4e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4e00 r8:8027ed34 r7:e0541e60 r6:84b8be80 r5:84bdc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0549fb0 to 0xe0549ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84b87fc0 INFO: task kworker/1:127:3748 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-syzkaller #0 r5:84bdd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0535e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae50c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bdd400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe59000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d40 r6:83018200 r5:84b1778c r4:84ae4e80 5fa0: 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0421dc0 r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 r4:00000001 INFO: task kworker/0:193:3752 blocked for more than 452 seconds. r5:84bde000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b8bf00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b8bf00 r8:8027ed34 r7:e04ede60 r6:84817000 r5:84bde000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe054dfb0 to 0xe054dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ad8640 INFO: task kworker/0:193:3752 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 967c0000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:3755 blocked for more than 452 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e04f5d84 r8:00000002 r7:60000113 r6:e04f5d8c r5:84bdec00 r4:84bdec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84bdec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ad89c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84bdec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 r5:84b5db8c r4:84b5d800 Exception stack(0xe04f5fb0 to 0xe04f5ff8) r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-syzkaller #0 r5:84bd8000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:84bd8000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff89000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b5df8c r4:84b5dc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:84b5df8c r4:84817180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bd8000 r8:848171ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84817180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84817180 r8:8027ed34 r7:e04ede60 r6:84817200 r5:84bd8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0551fb0 to 0xe0551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:82ac11e4 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r5:84856c00 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:84b1878c r4:84b18400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1878c r4:84ae4f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84856c00 r8:84ae4f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84ae4f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae4f00 r8:8027ed34 r7:e0541e60 r6:84817280 r5:84856c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0559fb0 to 0xe0559ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae5380 INFO: task kworker/1:129:3759 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 96ec0000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85d4778c r4:85d47400 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fa0: 00000000 00000000 00000000 00000000 r4:84ae0100 Not tainted 6.15.0-syzkaller #0 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a20000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:00001000 r4:dffb9000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84ae4f80 r8:8027ed34 r7:e0559e60 r6:84817300 r5:84a20000 INFO: task kworker/1:130:3762 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 96ec0000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a20c00 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84817380 r8:8027ed34 r7:e04ede60 r6:84817400 r5:84a20c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ad8dc0 INFO: task kworker/0:196:3763 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 96ec0000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:131:3765 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:131 state:D stack:0 pid:3765 tgid:3765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0565d84 r8:00000002 r7:60000113 r6:e0565d8c r5:84a21800 r4:84a21800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a21800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0565e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:84af7000 task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000001 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0581d84 r8:00000002 r7:60000013 r6:e0581d8c r5:84a24800 r4:84a24800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a24800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0581e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae5a80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a24800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0013000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b18b8c r4:84b18800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b18b8c r4:84af7100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a24800 r8:84af712c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7100 r8:8027ed34 r7:e0559e60 r6:84817580 r5:84a24800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0581fb0 to 0xe0581ff8) Workqueue: events bpf_prog_free_deferred r4:e0421dc0 r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84a23c00 r5:84a23c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0591e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae5d80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00dd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1938c r4:84b19000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1938c r4:84af7180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a23c00 r8:84af71ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7180 r8:8027ed34 r7:e0581e60 r6:84817600 r5:84a23c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0591fb0 to 0xe0591ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80000013 r4:80239bd0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:135:3772 blocked for more than 452 seconds. r5:84ac3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84ac3c00 r8:84af722c r7:82804d40 r6:ddde2d40 r5:ddde2d60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80000013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:136:3775 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:136 state:D stack:0 pid:3775 tgid:3775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0599d84 r8:00000002 r7:60000013 r6:e0599d8c r5:84ac3000 r4:84ac3000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ac3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0599e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae5e80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ac3000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df983000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b1978c r4:84b19400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b1978c r4:84af7300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac3000 r8:84af732c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7300 r8:8027ed34 r7:e0591e60 r6:84af7380 r5:84ac3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0599fb0 to 0xe0599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae5fc0 INFO: task kworker/1:136:3775 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 983a4000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:e0421dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:137:3777 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:137 state:D stack:0 pid:3777 tgid:3777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:84bc0000 r5:84bc0000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05a5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478db80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84bc0000 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb55000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84b19b8c r4:84b19800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:84b19b8c r4:84af7400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84bc0000 r8:84af742c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af7400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af7400 r8:8027ed34 r7:e0599e60 r6:84af7480 r5:84bc0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05a5fb0 to 0xe05a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8478dc00 INFO: task kworker/1:137:3777 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482c800 r8:80200be4 r7:e0421d54 r6:ffffffff r5:8482c800 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0421d20 to 0xe0421d68) 1d20: 983a4000 dffc7000 00000001 80239bb8 7f1e3000 00000001 82ac11c4 82ac05a0 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 1d60: 80000013 ffffffff r5:80000013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545b540 r5:00001000 r4:eda69000 r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84bc0c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0459e08 r5:00001000 r4:dfbe1000 r10:61c88647 r9:84bc0c00 r8:84af752c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8478dc00 Call trace: 1d40: 7f1e3000 dffc7000 8280c9b4 e0421d9c e0421da0 e0421d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0421dc0 r5:e0421e08 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8482c800 r7:00000000 r6:83018000 r5:00001000 r4:7f1e3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda69000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d4778c r4:85d47400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85d4778c r4:84ae2180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482c800 r8:84ae21ac r7:82804d40 r6:dddced40 r5:dddced60 r4:84ae2180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae2180 r8:8027ed34 r7:e041de60 r6:84ae2200 r5:8482c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0421fb0 to 0xe0421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae0100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:139:3781 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:139 state:D stack:0 pid:3781 tgid:3781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0465d84 r8:00000002 r7:60000013 r6:e0465d8c r5:84a26000 r4:84a26000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a26000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0465e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8477f740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a26000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r5:84b19f8c r4:84b19c00 r4:84af7580 r10:00000000 r9:84af7580 r8:8027ed34 r7:e0459e60 r6:84817700 r5:84a26000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0465fb0 to 0xe0465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84ae5500 INFO: task kworker/1:139:3781 is blocked on a mutex likely owned by task kworker/0:176:3656. task:kworker/0:176 state:R running task stack:0 pid:3656 tgid:3656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue <> imeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:6115 tgid:6115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec94dd84 r8:00000002 r7:60000113 r6:ec94dd8c r5:8590bc00 r4:8590bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000001 Workqueue: events bpf_prog_free_deferred r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Workqueue: events bpf_prog_free_deferred [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85447100 INFO: task kworker/1:936:6116 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: cfa7e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 task:kworker/1:937 state:D stack:0 pid:6118 tgid:6118 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85975400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8bde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85447500 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85975400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaf9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84233f8c r4:84233c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85622f00 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84af8400 task:kworker/1:939 state:D stack:0 pid:6123 tgid:6123 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:940:6125 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:940 state:D stack:0 pid:6125 tgid:6125 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:61c88647 r9:85976c00 r8:8545912c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:800d0013 r4:80239bd0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:941:6127 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:941 state:D stack:0 pid:6127 tgid:6127 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:942:6129 blocked for more than 475 seconds. r5:8509a400 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r5:8509b000 r4:829187f0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:82ac11e4 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:944:6132 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:944 state:D stack:0 pid:6132 tgid:6132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r5:85099800 r4:829187f0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000000 r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 task:kworker/1:945 state:D stack:0 pid:6134 tgid:6134 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8598578c r4:85985400 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84af8400 INFO: task kworker/1:946:6137 blocked for more than 475 seconds. r5:8509c800 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Workqueue: events bpf_prog_free_deferred [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/0:552 state:D stack:0 pid:6139 tgid:6139 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:ec75f000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85454f00 INFO: task kworker/0:552:6139 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d2167000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) 9fa0: 00000000 00000000 00000000 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec9ede08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546f340 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8509ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592e38c r4:8592e000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8592e38c r4:85466200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509ec00 r8:8546622c r7:82804d40 r6:dddced40 r5:dddced60 r4:85466200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85466200 r8:8027ed34 r7:ec8e1e60 r6:85466280 r5:8509ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84af8400 task:kworker/1:948 state:D stack:0 pid:6145 tgid:6145 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8509bc00 r8:8545962c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85459600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85459600 r8:8027ed34 r7:ecb49e60 r6:85466300 r5:8509bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb51fb0 to 0xecb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r5:85973000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb4dfb0 to 0xecb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8546d400 INFO: task kworker/1:949:6147 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800d0013 r4:80239bd0 r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85970000 r5:85970000 r4:829187f0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:951 state:D stack:0 pid:6151 tgid:6151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb59d84 r8:00000002 r7:60000113 r6:ecb59d8c r5:8596ec00 r4:8596ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8596ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb59e08 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r5:8596e000 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:ecaa9d84 r8:00000002 r7:60000113 r6:ecaa9d8c r5:859e1800 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:00000000 r9:85466380 r8:8027ed34 r7:ec9ede60 r6:85459b00 r5:859e1800 Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d407c000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 task:kworker/1:953 state:D stack:0 pid:6162 tgid:6162 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:859e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r4:8546dd40 r5:800d0013 r4:80239bd0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb6de08 r4:85466400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85466400 r8:8027ed34 r7:ecaa9e60 r6:85459c80 r5:859e3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb6dfb0 to 0xecb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8546f580 INFO: task kworker/0:555:6163 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe0425d20 to 0xe0425d68) r5:849a538c r4:849a5000 task:kworker/0:556 state:D stack:0 pid:6164 tgid:6164 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8592eb8c r4:8592e800 INFO: task kworker/0:556:6164 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d4b0b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:e0425dc0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:859e4800 r4:829187f0 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r5:859e5400 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:859e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85987f8c r4:85987c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85987f8c r4:85459e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e5400 r8:85459eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Workqueue: events bpf_prog_free_deferred r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:85466500 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84af8400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb65d84 r8:00000002 r7:60000013 r6:ecb65d8c r5:8590c800 r4:8590c800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8590c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb65e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546f9c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8590c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 task:kworker/0:559 state:D stack:0 pid:6171 tgid:6171 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85098c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb61e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546fc40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85098c00 r8:8546672c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xe0425d20 to 0xe0425d68) r5:849a538c r4:849a5000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb81e08 Exception stack(0xecb81fb0 to 0xecb81ff8) r4:8546fc00 INFO: task kworker/0:560:6175 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d5f6d000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:85978c00 r4:829187f0 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:562:6178 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 r5:85979800 r4:829187f0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Workqueue: events bpf_prog_free_deferred r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d7329000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8597bc00 r5:8597bc00 r4:829187f0 r5:00001000 r4:ec789000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:e0425dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:829187f4 r9:ecb9dd84 r8:00000002 r7:60000113 r6:ecb9dd8c r5:8597c800 r9:83018005 r8:8597c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 r5:00001000 r4:ec7e1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593d38c r4:8593d000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8593d38c r4:85466e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8597c800 r8:85466e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85466e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85466e00 r8:8027ed34 r7:ecb95e60 r6:85466e80 r5:8597c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb9dfb0 to 0xecb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8544c100 INFO: task kworker/0:566:6186 is blocked on a mutex likely owned by task kworker/1:102:3666. Workqueue: events bpf_prog_free_deferred r4:e0425dc0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8597d400 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000001 Call trace: r4:e0425dc0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 task:kworker/0:568 state:D stack:0 pid:6191 tgid:6191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecba5d84 r8:00000002 r7:60000013 r6:ecba5d8c r5:8597e000 r4:8597e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8597e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544c580 r7:dddced40 r6:83018000 r5:8593db8c r4:85449000 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r5:859e2400 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593e38c r4:8593e000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8593e38c r4:85449100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e2400 r8:8544912c r7:82804d40 r6:dddced40 r5:dddced60 r4:85449100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85449100 r8:8027ed34 r7:ecba5e60 r6:85459f80 r5:859e2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb1fb0 to 0xecbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:84af8400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8597ec00 r4:829187f0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec829000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593df8c r4:8593dc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8593df8c r4:85449180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8597ec00 r8:854491ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85449180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8544ca00 INFO: task kworker/0:570:6194 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: 5d60: 800d0013 ffffffff r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:571:6196 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:6196 tgid:6196 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85100000 r4:829187f0 r4:00000000 r5:00001000 r4:ec85d000 Exception stack(0xecbadfb0 to 0xecbadff8) 5d60: 800d0013 ffffffff r5:849a538c r4:849a5000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:572 state:D stack:0 pid:6197 tgid:6197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb99d84 r8:00000002 r7:60000113 r6:ecb99d8c r5:85100c00 r4:85100c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85100c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 9fa0: 00000000 00000000 00000000 00000000 r4:e0425dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbb9e08 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d90e2000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 task:kworker/0:574 state:D stack:0 pid:6203 tgid:6203 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fa1c0 r4:85449580 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:00000001 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:6204 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:6204 tgid:6204 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbc5d84 r8:00000002 r7:60000013 r6:ecbc5d8c r5:85103000 r4:85103000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85103000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544cec0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85103c00 r4:829187f0 r9:83018005 r8:85103c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec945000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593f78c r4:8593f400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8593f78c r4:85449780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85103c00 r8:854497ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85449780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85449780 r8:8027ed34 r7:ecbbde60 r6:85449800 r5:85103c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbc9fb0 to 0xecbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:00000001 INFO: task kworker/0:577:6208 blocked for more than 476 seconds. [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:85449880 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853fa180 INFO: task kworker/0:577:6208 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: d9c36000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:578:6210 blocked for more than 476 seconds. r5:85105400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:6211 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:6211 tgid:6211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbc1d84 r8:00000002 r7:60000013 r6:ecbc1d8c r5:85106000 r4:85106000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85106000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fa540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85106000 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec97b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b438c r4:856b4000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: da87a000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:859b8c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fa740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec983000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b478c r4:856b4400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b478c r4:85449b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b8c00 r8:85449bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85449b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85449b80 r8:8027ed34 r7:ecbd1e60 r6:85449c00 r5:859b8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd9fb0 to 0xecbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853fa680 INFO: task kworker/0:580:6214 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/0:581:6215 blocked for more than 476 seconds. r5:859ba400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:856b538c r4:85449c80 Exception stack(0xecbddfb0 to 0xecbddff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:582:6217 blocked for more than 476 seconds. r5:859b8000 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853fac40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9a9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b4f8c r4:856b4c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b4f8c r4:85449d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b8000 r8:85449dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85449d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85449d80 r8:8027ed34 r7:ecbdde60 r6:85449e00 r5:859b8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe1fb0 to 0xecbe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853fa900 INFO: task kworker/0:582:6217 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: db3c2000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r5:859bbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2040 r10:61c88647 r9:859bbc00 r8:85449eac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: db992000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) task:kworker/1:956 state:D stack:0 pid:6222 tgid:6222 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:85994f8c r4:85994c00 r10:00000000 r9:85459980 r8:8027ed34 r7:ecb75e60 r6:853e2000 r5:859e9800 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: db992000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:6223 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:6223 tgid:6223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbedd84 r8:00000002 r7:60000113 r6:ecbedd8c r5:859e8000 r4:859e8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859e8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbede08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:859ea400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:859ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 r7:dddced40 r6:83018000 r5:856b5b8c r4:853ed000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859ea400 r8:853ed02c r7:82804d40 r6:dddced40 r5:dddced60 r4:853ed000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed000 r8:8027ed34 r7:ecbede60 r6:853e2100 r5:859ea400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca05fb0 to 0xeca05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f2100 INFO: task kworker/0:585:6225 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: dbead000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r5:859eb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecbe9fb0 to 0xecbe9ff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859ec800 r5:859ec800 r4:829187f0 r4:00000000 r4:00000000 r5:856b638c r4:856b6000 r10:00000000 r9:853ed100 r8:8027ed34 r7:ecbe9e60 r6:853e2200 r5:859ec800 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:6233 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:6233 tgid:6233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc05d84 r8:00000002 r7:60000113 r6:ecc05d8c r5:859ee000 r4:859ee000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859ee000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc05e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2b00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec675000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b738c r4:856b7000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b738c r4:853ed180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859ee000 r8:853ed1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853ed180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed180 r8:8027ed34 r7:ecbe9e60 r6:853e2280 r5:859ee000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc05fb0 to 0xecc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f2800 INFO: task kworker/0:588:6233 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: dccbe000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:859ebc00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:6236 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:6236 tgid:6236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbf1d84 r8:00000002 r7:60000013 r6:ecbf1d8c r5:859b9800 r4:859b9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f29c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec547000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856b6f8c r4:856b6c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856b6f8c r4:853ed280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b9800 r8:853ed2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853ed280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed280 r8:8027ed34 r7:ecc05e60 r6:853ed300 r5:859b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf1fb0 to 0xecbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:859bc800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2bc0 r7:dddced40 r6:83018000 r5:856b778c r4:853ed380 Exception stack(0xecc11fb0 to 0xecc11ff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) task:kworker/0:592 state:D stack:0 pid:6241 tgid:6241 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ec72b000 r10:61c88647 r9:859bd400 r8:853ed4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853ed480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed480 r8:8027ed34 r7:ecc11e60 r6:853ed500 r5:859bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc15fb0 to 0xecc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853f2c00 INFO: task kworker/0:592:6241 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: dd7a3000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:593:6243 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:593 state:D stack:0 pid:6243 tgid:6243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc19d84 r8:00000002 r7:60000113 r6:ecc19d8c r5:859be000 r4:859be000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859be000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc19e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546cc80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:00001000 r4:ec753000 r10:61c88647 r9:859be000 r8:853ed5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853f2d00 r4:00000000 r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:859bec00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d30c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d60: 800d0013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:595:6247 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:595 state:D stack:0 pid:6247 tgid:6247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc21d84 r8:00000002 r7:60000113 r6:ecc21d8c r5:859bb000 r4:859bb000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859bb000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc21e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546d740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8b7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1c38c r4:85a1c000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1c38c r4:853ed780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859bb000 r8:853ed7ac r7:82804d40 r6:dddced40 r5:dddced60 r4:853ed780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853ed780 r8:8027ed34 r7:ecc1de60 r6:853ed800 r5:859bb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc21fb0 to 0xecc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853faf40 INFO: task kworker/0:595:6247 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ecc25d84 r8:00000002 r7:60000013 r6:ecc25d8c r5:85106c00 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:853ed880 r8:8027ed34 r7:ecc1de60 r6:853ed900 r5:85106c00 Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:6252 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:6252 tgid:6252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbf5d84 r8:00000002 r7:60000013 r6:ecbf5d8c r5:84890c00 r4:84890c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84890c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84890c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8eb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1cb8c r4:85a1c800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1cb8c r4:853ed980 r10:00000000 r9:853ed980 r8:8027ed34 r7:ecc1de60 r6:853eda00 r5:84890c00 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84891800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3300 r7:dddced40 r6:83018000 r5:85a1d38c r4:853eda80 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r5:800d0013 r4:80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r5:84892400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1d78c r4:85a1d400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1d78c r4:853edb80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84892400 r8:853edbac r7:82804d40 r6:dddced40 r5:dddced60 r4:853edb80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853edb80 r8:8027ed34 r7:ecc2de60 r6:853edc00 r5:84892400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc31fb0 to 0xecc31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d35c0 INFO: task kworker/0:599:6256 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: df051000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:6257 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:84893000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: df051000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Not tainted 6.15.0-syzkaller #0 r5:84893c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3780 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84893c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca15000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1df8c r4:85a1dc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1df8c r4:853edd80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84893c00 r8:853eddac r7:82804d40 r6:dddced40 r5:dddced60 r4:853edd80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853edd80 r8:8027ed34 r7:ecc29e60 r6:853ede00 r5:84893c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc35fb0 to 0xecc35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d3540 INFO: task kworker/0:601:6260 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: df60a000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:84894800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3a00 r7:dddced40 r6:83018000 r5:85a1e78c r4:853ede80 Exception stack(0xecc39fb0 to 0xecc39ff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:84895400 r4:829187f0 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:6265 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:6265 tgid:6265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc41d84 r8:00000002 r7:60000013 r6:ecc41d8c r5:84896000 r4:84896000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84896000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc41e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3900 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84896000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca45000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1eb8c r4:85a1e800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1eb8c r4:852bb080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84896000 r8:852bb0ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb080 r8:8027ed34 r7:ecc39e60 r6:852bb100 r5:84896000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc41fb0 to 0xecc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853d3900 INFO: task kworker/0:604:6265 is blocked on a mutex likely owned by task kworker/1:102:3666. Call trace: 5d60: 800d0013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:84896c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: e049e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:6269 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:6269 tgid:6269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc51d84 r8:00000002 r7:60000113 r6:ecc51d8c r5:859eec00 r4:859eec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859eec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc51e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3e00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1ef8c r4:85a1ec00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1ef8c r4:852bb280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859eec00 r8:852bb2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb280 r8:8027ed34 r7:ecc45e60 r6:853e2380 r5:859eec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc51fb0 to 0xecc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84af1fc0 Call trace: r5:859e0000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc59e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853d3f00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca79000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1f38c r4:85a1f000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1f38c r4:852bb300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e0000 r8:852bb32c r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb300 r8:8027ed34 r7:ecc45e60 r6:853e2400 r5:859e0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc59fb0 to 0xecc59ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:608:6274 blocked for more than 477 seconds. r5:859ed400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc65e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4140 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca99000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1fb8c r4:85a1f800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1fb8c r4:852bb380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859ed400 r8:852bb3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb380 r8:8027ed34 r7:ecc45e60 r6:853e2480 r5:859ed400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc65fb0 to 0xecc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b4280 INFO: task kworker/0:608:6274 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r4:859e8c00 r5:859e8c00 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc69e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e8c00 r8:852bb42c r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb400 r8:8027ed34 r7:ecc65e60 r6:853e2500 r5:859e8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc69fb0 to 0xecc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b4280 INFO: task kworker/0:609:6275 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e1353000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84890000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4300 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84890000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecaab000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a1ff8c r4:85a1fc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a1ff8c r4:852bb480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84890000 r8:852bb4ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb480 r8:8027ed34 r7:ecc69e60 r6:852bb500 r5:84890000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc49fb0 to 0xecc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b4080 INFO: task kworker/0:610:6276 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 INFO: task kworker/0:611:6279 blocked for more than 477 seconds. r5:84958000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4480 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84958000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab5000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2838c r4:85a28000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2838c r4:852bb580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84958000 r8:852bb5ac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bb580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bb580 r8:8027ed34 r7:ecc69e60 r6:852bb600 r5:84958000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc6dfb0 to 0xecc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b45c0 INFO: task kworker/0:611:6279 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e1b56000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r5:84958c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a2878c r4:852bb680 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e219f000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Not tainted 6.15.0-syzkaller #0 r5:84959800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85a28f8c r4:85a28c00 r10:00000000 r9:852bb780 r8:8027ed34 r7:ecc69e60 r6:852bb800 r5:84959800 Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:614:6285 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:614 state:D stack:0 pid:6285 tgid:6285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc4dd84 r8:00000002 r7:60000113 r6:ecc4dd8c r5:8495a400 r4:8495a400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8495a400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc4de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4a80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8495a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb11000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2938c r4:85a29000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2938c r4:852bb880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495a400 r8:852bb8ac r7:82804d40 r6:dddced40 r5:dddced60 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8495b000 r4:829187f0 r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:6289 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:6289 tgid:6289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc81d84 r8:00000002 r7:60000013 r6:ecc81d8c r5:8495bc00 r4:8495bc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8495bc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc81e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4d00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8495bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb33000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a29b8c r4:85a29800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a29b8c r4:852bba80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495bc00 r8:852bbaac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bba80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xecc81fb0 to 0xecc81ff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 Exception stack(0xe0425fb0 to 0xe0425ff8) INFO: task kworker/0:617:6291 blocked for more than 477 seconds. r5:8495c800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc85e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:852bbb80 r8:8027ed34 r7:ecc81e60 r6:852bbc00 r5:8495c800 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ecc8dd84 r8:00000002 r7:60000113 r6:ecc8dd8c r5:8495d400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc8de08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2ab8c r4:85a2a800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2ab8c r4:852bbc80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495d400 r8:852bbcac r7:82804d40 r6:dddced40 r5:dddced60 r4:852bbc80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bbc80 r8:8027ed34 r7:ecc85e60 r6:852bbd00 r5:8495d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc8dfb0 to 0xecc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852b4ec0 INFO: task kworker/0:618:6294 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e3499000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8495e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:8495e000 r8:852bbdac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af1fc0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecca9d84 r8:00000002 r7:60000013 r6:ecca9d8c r5:8495ec00 r4:8495ec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8495ec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852d3840 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8495ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccc9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599438c r4:85994000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8599438c r4:853e2580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495ec00 r8:853e25ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e2580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2580 r8:8027ed34 r7:ecbd5e60 r6:852bbe80 r5:8495ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecca9fb0 to 0xecca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852d3340 INFO: task kworker/1:957:6296 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e38c7000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) Not tainted 6.15.0-syzkaller #0 r5:859d0000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc9de08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:852a52c0 [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:e0425dc0 r5:00001000 r4:dffd1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:621:6301 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:621 state:D stack:0 pid:6301 tgid:6301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccb9d84 r8:00000002 r7:60000013 r6:eccb9d8c r5:859d0c00 r4:859d0c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859d0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccb9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a5800 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccd3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2b78c r4:85a2b400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2b78c r4:85226000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d0c00 r8:8522602c r7:82804d40 r6:dddced40 r5:dddced60 r4:85226000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226000 r8:8027ed34 r7:ecc9de60 r6:85226080 r5:859d0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccb9fb0 to 0xeccb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d60: 800d0013 ffffffff r4:e0425dc0 r5:00001000 r4:dffd1000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859d1800 r5:859d1800 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85a2b38c r4:85a2b000 r4:85226100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226100 r8:8027ed34 r7:eccb9e60 r6:85226180 r5:859d1800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccc1fb0 to 0xeccc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5780 INFO: task kworker/0:622:6303 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e47ab000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0425fb0 to 0xe0425ff8) task:kworker/1:958 state:D stack:0 pid:6305 tgid:6305 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:859d2400 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:853e2600 r8:8027ed34 r7:ecbd5e60 r6:85226200 r5:859d2400 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:00000001 r4:84af1fc0 Call trace: r5:859d3000 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85226280 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:624:6309 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:624 state:D stack:0 pid:6309 tgid:6309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccddd84 r8:00000002 r7:60000013 r6:eccddd8c r5:859d3c00 r4:859d3c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859d3c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccdde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852a58c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccd9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2bb8c r4:85a2b800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a2bb8c r4:85226380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d3c00 r8:852263ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226380 r8:8027ed34 r7:ecccde60 r6:85226400 r5:859d3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccddfb0 to 0xeccddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5900 INFO: task kworker/0:624:6309 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e4dce000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:859f0000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85a3438c r4:85226480 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e4dce000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 Exception stack(0xe0425fb0 to 0xe0425ff8) task:kworker/0:626 state:D stack:0 pid:6313 tgid:6313 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:859f1800 r4:829187f0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:859f1800 r8:8522652c r7:82804d40 r6:dddced40 r5:dddced60 INFO: task kworker/0:626:6313 is blocked on a mutex likely owned by task kworker/1:102:3666. [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:627:6314 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:627 state:D stack:0 pid:6314 tgid:6314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd05d84 r8:00000002 r7:60000113 r6:ecd05d8c r5:859f2400 r4:859f2400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f2400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd05e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852b4e80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb57000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a34b8c r4:85a34800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a34b8c r4:85226580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f2400 r8:852265ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226580 r8:8027ed34 r7:ecd01e60 r6:853e2780 r5:859f2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd05fb0 to 0xecd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5f00 INFO: task kworker/0:627:6314 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e547a000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r5:849a538c r4:849a5000 r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 INFO: task kworker/0:628:6316 blocked for more than 477 seconds. r5:859f3000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85203900 r5:85a36b8c r4:85a36800 r4:85226600 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r4:e0425dc0 r5:00001000 r4:dffd1000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd11d84 r8:00000002 r7:60000113 r6:ecd11d8c r5:859f4800 r4:859f4800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f4800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd11e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85203040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4bd000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a34f8c r4:85a34c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a34f8c r4:85226680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f4800 r8:852266ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226680 r8:8027ed34 r7:ecd09e60 r6:853e2880 r5:859f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd11fb0 to 0xecd11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:852a5f40 INFO: task kworker/0:629:6318 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e58dd000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:859f3c00 r4:829187f0 r4:00000000 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85203280 INFO: task kworker/0:630:6320 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e58dd000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:ecd21d84 r8:00000002 r7:60000013 r6:ecd21d8c r5:859f5400 r5:859f5400 r4:829187f0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85226780 1fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:859f6c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a35b8c r4:85a35800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a35b8c r4:85226800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859f6c00 r8:8522682c r7:82804d40 r6:dddced40 r5:dddced60 r4:85226800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226800 r8:8027ed34 r7:ecd09e60 r6:853e2a00 r5:859f6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd25fb0 to 0xecd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85203240 INFO: task kworker/0:632:6324 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e647e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 INFO: task kworker/0:633:6326 blocked for more than 477 seconds. r5:859f0c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:852033c0 INFO: task kworker/0:633:6326 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e647e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 r4:84af1fc0 task:kworker/0:634 state:D stack:0 pid:6328 tgid:6328 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:859e6000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd35e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85226900 r8:8027ed34 r7:ecd09e60 r6:853e2b00 r5:859e6000 Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:635:6331 blocked for more than 477 seconds. r5:859e6c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc51000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3678c r4:85a36400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3678c r4:85226980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859e6c00 r8:852269ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226980 r8:8027ed34 r7:ecd09e60 r6:853e2b80 r5:859e6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd39fb0 to 0xecd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85203800 INFO: task kworker/0:635:6331 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e647e000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:85a36f8c r4:85a36c00 r10:00000000 r9:85226a00 r8:8027ed34 r7:ecd09e60 r6:853e2c00 r5:859f6000 task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85a3838c r4:85a38000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3838c r4:85226a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859c8000 r8:85226aac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226a80 r8:8027ed34 r7:ecd3de60 r6:853e2c80 r5:859c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd1dfb0 to 0xecd1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85203a80 INFO: task kworker/0:637:6335 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e6c1b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:638:6337 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:638 state:D stack:0 pid:6337 tgid:6337 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a3738c r4:85226b00 Exception stack(0xecd31fb0 to 0xecd31ff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) INFO: task kworker/1:959:6340 blocked for more than 477 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccf1d84 r8:00000002 r7:60000113 r6:eccf1d8c r5:859c9800 r4:859c9800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859c9800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccf1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f0780 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb2b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3f38c r4:85a3f000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a3f38c r4:853e2d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859c9800 r8:853e2dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:853e2d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853e2d80 r8:8027ed34 r7:ecbd5e60 r6:853e2e00 r5:859c9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf1fb0 to 0xeccf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8515c2c0 INFO: task kworker/1:959:6340 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8599578c r4:853e2e80 Exception stack(0xecd45fb0 to 0xecd45ff8) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd49e08 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec879000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3778c r4:85a37400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3778c r4:85226b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859cb000 r8:85226bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226b80 r8:8027ed34 r7:ecd1de60 r6:853e2f80 r5:859cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd49fb0 to 0xecd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85203cc0 INFO: task kworker/0:639:6344 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e76eb000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd4de08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: e76eb000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84af8400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:641:6348 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:641 state:D stack:0 pid:6348 tgid:6348 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd51d84 r8:00000002 r7:60000013 r6:ecd51d8c r5:859cc800 r4:859cc800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859cc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd51e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a37f8c r4:85a37c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a37f8c r4:85226c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859cc800 r8:85226cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85226c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85226c80 r8:8027ed34 r7:ecd1de60 r6:851f5080 r5:859cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd51fb0 to 0xecd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f4100 INFO: task kworker/0:641:6348 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Not tainted 6.15.0-syzkaller #0 r5:859ce000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85a38f8c r4:85a38c00 r10:00000000 r9:85226d00 r8:8027ed34 r7:ecd1de60 r6:851f5100 r5:859ce000 Workqueue: events bpf_prog_free_deferred r5:800d0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859cec00 r4:00000000 r4:00000000 r5:85a3878c r4:85a38400 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f43c0 INFO: task kworker/0:643:6352 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e808c000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:644:6354 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:644 state:D stack:0 pid:6354 tgid:6354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd65d84 r8:00000002 r7:60000113 r6:ecd65d8c r5:859f8000 r4:859f8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859f8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85226e00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f4600 INFO: task kworker/0:644:6354 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e808c000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:85a3a38c r4:85a3a000 r4:85226e80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859fa400 r4:00000000 r4:00000000 r5:85a3938c r4:85a39000 r4:85226f00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e8a36000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:647:6359 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:647 state:D stack:0 pid:6359 tgid:6359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd79d84 r8:00000002 r7:60000113 r6:ecd79d8c r5:859fbc00 r4:859fbc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd79e08 r9:83018005 r8:859fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 r4:85226f80 Exception stack(0xecd79fb0 to 0xecd79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851f4680 INFO: task kworker/0:647:6359 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e90a5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd81e08 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d20: e90a5000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:649:6364 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:649 state:D stack:0 pid:6364 tgid:6364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd8dd84 r8:00000002 r7:60000113 r6:ecd8dd8c r5:859fc800 r4:859fc800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd8de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f4a80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb21000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a39f8c r4:85a39c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a39f8c r4:85157080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fc800 r8:851570ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85157080 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r5:00001000 r4:dffd1000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:859fe000 r8:8515712c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: e9426000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:651:6367 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:651 state:D stack:0 pid:6367 tgid:6367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd91d84 r8:00000002 r7:60000013 r6:ecd91d8c r5:859fec00 r4:859fec00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fec00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd91e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eb917000 r10:61c88647 r9:859fec00 r8:851571ac r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:652:6369 blocked for more than 478 seconds. r4:859fb000 r4:00000000 r9:83018005 r8:859fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 r4:85157200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:653:6372 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:653 state:D stack:0 pid:6372 tgid:6372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecda5d84 r8:00000002 r7:60000113 r6:ecda5d8c r5:85a00c00 r4:85a00c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a00c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85203c40 r7:dddced40 r6:83018000 r5:85a3af8c r4:85157280 Exception stack(0xecda5fb0 to 0xecda5ff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecdadfb0 to 0xecdadff8) task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: ea09b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:6375 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:6375 tgid:6375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdb1d84 r8:00000002 r7:60000113 r6:ecdb1d8c r5:85a00000 r4:85a00000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a00000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 r5:85a3b78c r4:85a3b400 r10:00000000 r9:85157380 r8:8027ed34 r7:ecc5de60 r6:851f5780 r5:85a00000 Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd41e08 r5:00001000 r4:ec775000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3bf8c r4:85a3bc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3bf8c r4:85157400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d6c00 r8:8515742c r7:82804d40 r6:dddced40 r5:dddced60 r4:85157400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85157400 r8:8027ed34 r7:ecc5de60 r6:85157480 r5:859d6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd41fb0 to 0xecd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85145140 r4:00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:657:6380 blocked for more than 478 seconds. r5:859d6000 r4:829187f0 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85a3c38c r4:85157500 Exception stack(0xecdb9fb0 to 0xecdb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85145580 INFO: task kworker/0:657:6380 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: ea656000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdbdd84 r8:00000002 r7:60000013 r6:ecdbdd8c r5:859d5400 r4:859d5400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859d5400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdbde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85145ac0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859d5400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca09000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85157600 Exception stack(0xecdbdfb0 to 0xecdbdff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:659:6384 blocked for more than 478 seconds. [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 800d0013 ffffffff r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdc5fb0 to 0xecdc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:851455c0 INFO: task kworker/0:660:6386 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: eac0b000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:661:6387 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:661 state:D stack:0 pid:6387 tgid:6387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:84930c00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85157900 Exception stack(0xecdc9fb0 to 0xecdc9ff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:6390 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:662 state:D stack:0 pid:6390 tgid:6390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd55d84 r8:00000002 r7:60000013 r6:ecd55d8c r5:84932400 r4:84932400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84932400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd55e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:663:6392 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:663 state:D stack:0 pid:6392 tgid:6392 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r4:84933000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85157b00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd9e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85157c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85157c00 r8:8027ed34 r7:ecdd1e60 r6:85157c80 r5:84931800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd9fb0 to 0xecdd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85145ec0 INFO: task kworker/0:664:6395 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0425d20 to 0xe0425d68) 5d20: eb4dd000 eda6b000 00000001 80239bb8 7f1e5000 00000001 82ac11c4 82ac05a0 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 5d60: 800d0013 ffffffff r5:800d0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0425d20 to 0xe0425d68) r4:e0425dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecdcdfb0 to 0xecdcdff8) Workqueue: events bpf_prog_free_deferred 5d60: 800d0013 ffffffff r4:e0425dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:667:6400 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:667 state:D stack:0 pid:6400 tgid:6400 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecde1d84 r8:00000002 r7:60000013 r6:ecde1d8c r5:85a03c00 r4:85a03c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a03c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f0300 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a03c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3e78c r4:85a3e400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85157e80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ecae5000 r10:61c88647 r9:85a04800 r8:85157f2c r7:82804d40 r6:dddced40 r5:dddced60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:669:6404 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:669 state:D stack:0 pid:6404 tgid:6404 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecde9d84 r8:00000002 r7:60000013 r6:ecde9d8c r5:85a05400 r4:85a05400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a05400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f0c00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a05400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc73000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a3fb8c r4:85a3f800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a3fb8c r4:85157f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a05400 r8:85157fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85157f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85157f80 r8:8027ed34 r7:ecddde60 r6:851f5980 r5:85a05400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecde9fb0 to 0xecde9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f0440 INFO: task kworker/0:669:6404 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0425d20 to 0xe0425d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0425dc0 r5:e0425e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 r4:00000001 r4:84af1fc0 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xecdedfb0 to 0xecdedff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:961:6408 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:961 state:D stack:0 pid:6408 tgid:6408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdd5d84 r8:00000002 r7:60000113 r6:ecdd5d8c r5:85a06c00 r4:85a06c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a06c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851425c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85a06c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc09000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85995f8c r4:85995c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85995f8c r4:851f5a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a06c00 r8:851f5aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f5a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5a80 r8:8027ed34 r7:eccf1e60 r6:851f5b00 r5:85a06c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd5fb0 to 0xecdd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85142fc0 INFO: task kworker/1:961:6408 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r5:00001000 r4:dffd1000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84af8400 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xecdf1fb0 to 0xecdf1ff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:963:6414 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:963 state:D stack:0 pid:6414 tgid:6414 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdf5d84 r8:00000002 r7:60000013 r6:ecdf5d8c r5:859cd400 r4:859cd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859cd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857a8a00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed227000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599738c r4:85997000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8599738c r4:851f5c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859cd400 r8:851f5cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f5c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5c80 r8:8027ed34 r7:ecdd5e60 r6:851f5d00 r5:859cd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdf5fb0 to 0xecdf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85142500 INFO: task kworker/1:963:6414 is blocked on a mutex likely owned by task kworker/1:102:3666. task:kworker/1:102 state:R running task stack:0 pid:3666 tgid:3666 ppid:2 task_flags:0x4208060 flags:0x00000000 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:6416 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:671 state:D stack:0 pid:6416 tgid:6416 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482d400 r8:80200be4 r7:e0425d54 r6:ffffffff r5:8482d400 r4:e0425dc0 r5:00001000 r4:dffd1000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf9e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 5d60: 800d0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af1ec0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:964:6420 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:964 state:D stack:0 pid:6420 tgid:6420 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece01d84 r8:00000002 r7:60000113 r6:ece01d8c r5:84936c00 r4:84936c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84936c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece01e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e7b40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84936c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd67000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abd38c r4:85abd000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85abd38c r4:851f5d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84936c00 r8:851f5dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:851f5d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851f5d80 r8:8027ed34 r7:ecdf5e60 r6:850ef280 r5:84936c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece01fb0 to 0xece01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r5:00001000 r4:dffd1000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85a4878c r4:850ef300 Exception stack(0xece05fb0 to 0xece05ff8) Workqueue: events bpf_prog_free_deferred 5d40: 7f1e5000 eda6b000 8280c9b4 e0425d9c e0425da0 e0425d70 80230af4 80239bd0 r9:83018205 r8:8482d400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:849a538c r4:849a5000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:849a538c r4:84af8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482d400 r8:84af842c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8400 r8:8027ed34 r7:e0419e60 r6:84ae2400 r5:8482d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0425fb0 to 0xe0425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1fc0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:674:6424 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:674 state:D stack:0 pid:6424 tgid:6424 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece09d84 r8:00000002 r7:60000113 r6:ece09d8c r5:85a50000 r4:85a50000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a50000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece09e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6100 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a50000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecccf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a48f8c r4:85a48c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a48f8c r4:850ef400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a50000 r8:850ef42c r7:82804d40 r6:dddced40 r5:dddced60 r4:850ef400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0425d20 to 0xe0425d68) Not tainted 6.15.0-syzkaller #0 r5:85a50c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85a48b8c r4:85a48800 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d60: 900b0013 ffffffff [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) INFO: task kworker/0:676:6428 blocked for more than 478 seconds. r5:85a51800 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6bc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a51800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece45000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4ab8c r4:85a4a800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4ab8c r4:850ef600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a51800 r8:850ef62c r7:82804d40 r6:dddced40 r5:dddced60 r4:850ef600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef600 r8:8027ed34 r7:ece09e60 r6:850ef680 r5:85a51800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece0dfb0 to 0xece0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f60c0 INFO: task kworker/0:676:6428 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 7f5fa000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 900b0013 ffffffff r5:900b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 INFO: task kworker/0:677:6429 blocked for more than 478 seconds. r5:85a52400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1d40 task:kworker/0:678 state:D stack:0 pid:6430 tgid:6430 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:ece1dd84 r8:00000002 r7:60000013 r6:ece1dd8c r5:85a53000 r4:85a53000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a53000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece1de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6540 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a53000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4978c r4:85a49400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4978c r4:850ef800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a53000 r8:850ef82c r7:82804d40 r6:dddced40 r5:dddced60 r4:850ef800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef800 r8:8027ed34 r7:ece0de60 r6:850ef880 r5:85a53000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece1dfb0 to 0xece1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6300 INFO: task kworker/0:678:6430 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 7fcbc000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 900b0013 ffffffff r5:900b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85a53c00 r4:829187f0 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a49b8c r4:85a49800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a49b8c r4:850ef900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a53c00 r8:850ef92c r7:82804d40 r6:dddced40 r5:dddced60 r4:850ef900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef900 r8:8027ed34 r7:ece0de60 r6:850ef980 r5:85a53c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece19fb0 to 0xece19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6500 INFO: task kworker/0:679:6432 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8008f000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84af1d40 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85a54800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece29e08 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850efa00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6700 INFO: task kworker/0:680:6435 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8008f000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:681:6437 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:681 state:D stack:0 pid:6437 tgid:6437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece35d84 r8:00000002 r7:60000013 r6:ece35d8c r5:85a55400 r4:85a55400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a55400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece35e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6880 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a55400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece31000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4a38c r4:85a4a000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4a38c r4:850efb00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a55400 r8:850efb2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850efb00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efb00 r8:8027ed34 r7:ece0de60 r6:850efb80 r5:85a55400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece35fb0 to 0xece35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f68c0 INFO: task kworker/0:681:6437 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8051a000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:682:6439 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:682 state:D stack:0 pid:6439 tgid:6439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece49d84 r8:00000002 r7:60000013 r6:ece49d8c r5:85a56000 r4:85a56000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a56000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece49e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f69c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a56000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece3f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4a78c r4:85a4a400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4a78c r4:850efc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a56000 r8:850efc2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850efc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efc00 r8:8027ed34 r7:ece0de60 r6:850efc80 r5:85a56000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece49fb0 to 0xece49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6a00 INFO: task kworker/0:682:6439 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8051a000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:683:6440 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:683 state:D stack:0 pid:6440 tgid:6440 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece21d84 r8:00000002 r7:60000013 r6:ece21d8c r5:85a56c00 r4:85a56c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a56c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece21e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6ec0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a56c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece59000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4b38c r4:85a4b000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4b38c r4:850efd00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a56c00 r8:850efd2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850efd00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efd00 r8:8027ed34 r7:ece0de60 r6:850efd80 r5:85a56c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece21fb0 to 0xece21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6a00 INFO: task kworker/0:683:6440 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 809d8000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:684:6443 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:684 state:D stack:0 pid:6443 tgid:6443 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece51d84 r8:00000002 r7:60000013 r6:ece51d8c r5:85110000 r4:85110000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85110000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece51e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f6dc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85110000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece53000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4af8c r4:85a4ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4af8c r4:850efe00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85110000 r8:850efe2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850efe00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efe00 r8:8027ed34 r7:ece21e60 r6:850efe80 r5:85110000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece51fb0 to 0xece51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6d80 INFO: task kworker/0:684:6443 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 809d8000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:6445 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:6445 tgid:6445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece5dd84 r8:00000002 r7:60000113 r6:ece5dd8c r5:85110c00 r4:85110c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85110c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece5de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531e0c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85110c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece67000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4b78c r4:85a4b400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4b78c r4:850eff00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85110c00 r8:850eff2c r7:82804d40 r6:dddced40 r5:dddced60 r4:850eff00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850eff00 r8:8027ed34 r7:ece21e60 r6:850eff80 r5:85110c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece5dfb0 to 0xece5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:850f6d80 INFO: task kworker/0:685:6445 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 80e9d000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:686:6448 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:686 state:D stack:0 pid:6448 tgid:6448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece65d84 r8:00000002 r7:60000113 r6:ece65d8c r5:85111800 r4:85111800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85111800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece65e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531e500 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85111800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadbf000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab038c r4:85ab0000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab038c r4:8531a000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85111800 r8:8531a02c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531a000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531a000 r8:8027ed34 r7:ece5de60 r6:8531a080 r5:85111800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece65fb0 to 0xece65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531e1c0 INFO: task kworker/0:686:6448 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 80e9d000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:687:6449 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:687 state:D stack:0 pid:6449 tgid:6449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece71d84 r8:00000002 r7:60000013 r6:ece71d8c r5:85112400 r4:85112400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85112400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece71e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531e180 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85112400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece6d000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4bb8c r4:85a4b800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4bb8c r4:8531a100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85112400 r8:8531a12c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531a100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531a100 r8:8027ed34 r7:ece65e60 r6:8531a180 r5:85112400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece71fb0 to 0xece71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531e1c0 INFO: task kworker/0:687:6449 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:688:6451 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:688 state:D stack:0 pid:6451 tgid:6451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece79d84 r8:00000002 r7:60000013 r6:ece79d8c r5:85113000 r4:85113000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85113000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece79e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531e2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85113000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb33000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a4bf8c r4:85a4bc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a4bf8c r4:8531a200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85113000 r8:8531a22c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:8531a200 r8:8027ed34 r7:ece65e60 r6:8531a280 r5:85113000 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85113c00 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531e6c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:690:6456 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:690 state:D stack:0 pid:6456 tgid:6456 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece81d84 r8:00000002 r7:60000113 r6:ece81d8c r5:85114800 r4:85114800 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85114800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece81e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531e780 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85114800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8eb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab0b8c r4:85ab0800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab0b8c r4:8531a400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85114800 r8:8531a42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531a400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531a400 r8:8027ed34 r7:ece7de60 r6:8531a480 r5:85114800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece81fb0 to 0xece81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531e680 INFO: task kworker/0:690:6456 is blocked on a mutex likely owned by task kworker/1:101:3662. r4:00000000 r4:82ac11e4 r4:00000000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85115400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85115400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece85e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531ea80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85115400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd7000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab138c r4:85ab1000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab138c r4:8531a500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85115400 r8:8531a52c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531a500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531a500 r8:8027ed34 r7:ece81e60 r6:8531a580 r5:85115400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece85fb0 to 0xece85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531e7c0 INFO: task kworker/0:691:6457 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:692:6459 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:85116000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 r5:85ab0f8c r4:85ab0c00 r10:00000000 r9:8531a600 r8:8027ed34 r7:ece85e60 r6:8531a680 r5:85116000 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85116c00 r5:85116c00 r4:829187f0 r4:00000000 r9:83018005 r8:85116c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r4:8531a700 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d20: 81c38000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:694 state:D stack:0 pid:6464 tgid:6464 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece91d84 r8:00000002 r7:60000113 r6:ece91d8c r5:85a58000 r4:85a58000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a58000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece91e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8531ed80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a58000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec663000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab1b8c r4:85ab1800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab1b8c r4:8531a800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a58000 r8:8531a82c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531a800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531a800 r8:8027ed34 r7:ece8de60 r6:8531a880 r5:85a58000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece91fb0 to 0xece91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531ec80 INFO: task kworker/0:694:6464 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 81fbc000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 r4:e0419dc0 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85a58c00 r4:829187f0 r4:00000000 r9:83018005 r8:85a58c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 r10:61c88647 r9:85a58c00 r8:8531a92c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85a59800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece9de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ff040 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a59800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab1f8c r4:85ab1c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab1f8c r4:8531aa00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a59800 r8:8531aa2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531aa00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531aa00 r8:8027ed34 r7:ece95e60 r6:8531aa80 r5:85a59800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece9dfb0 to 0xece9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8531ec80 INFO: task kworker/0:696:6466 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 823a0000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85a5b000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ff5c0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r4:82ac11e4 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84af1d40 Workqueue: events bpf_prog_free_deferred r5:85a5c800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85ab278c r4:8531ac00 r10:61c88647 r9:85a5c800 r8:8531ac2c r7:82804d40 r6:dddced40 r5:dddced60 r4:8531ac00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8531ac00 r8:8027ed34 r7:ecea1e60 r6:8531ac80 r5:85a5c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea9fb0 to 0xecea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ff380 INFO: task kworker/0:698:6470 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 82882000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 INFO: task kworker/0:699:6474 blocked for more than 478 seconds. r5:85a5d400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 r5:00001000 r4:ee065000 r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af1d40 task:kworker/0:700 state:D stack:0 pid:6476 tgid:6476 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:8531ae00 r8:8027ed34 r7:eceade60 r6:8531ae80 r5:85a5bc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853ff680 INFO: task kworker/0:700:6476 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 83126000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:701 state:D stack:0 pid:6478 tgid:6478 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:702:6480 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:702 state:D stack:0 pid:6480 tgid:6480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eceb9d84 r8:00000002 r7:60000013 r6:eceb9d8c r5:852c8000 r4:852c8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eceb9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853ffe80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab3b8c r4:85ab3800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab3b8c r4:85458000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c8000 r8:8545802c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458000 r8:8027ed34 r7:eceb5e60 r6:85458080 r5:852c8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceb9fb0 to 0xeceb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853ffa80 r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecebdfb0 to 0xecebdff8) task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:704:6484 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:704 state:D stack:0 pid:6484 tgid:6484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecec1d84 r8:00000002 r7:60000113 r6:ecec1d8c r5:852c8c00 r4:852c8c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852c8c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec1e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e7000 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb1f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ab3f8c r4:85ab3c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ab3f8c r4:85458200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c8c00 r8:8545822c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458200 r8:8027ed34 r7:ecebde60 r6:85458280 r5:852c8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec1fb0 to 0xecec1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:853e7100 Call trace: 9d60: 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800b0013 r4:80239bd0 r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:852cc800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec9e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e76c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:852cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd13000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abcb8c r4:85abc800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abcb8c r4:85458400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cc800 r8:8545842c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458400 r8:8027ed34 r7:ecec5e60 r6:85458480 r5:852cc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecec9fb0 to 0xecec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e7400 INFO: task kworker/0:706:6488 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 83ad6000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ececdd84 r8:00000002 r7:60000013 r6:ececdd8c r5:852cd400 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85458500 r8:8027ed34 r7:ecec9e60 r6:85458580 r5:852cd400 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0419fb0 to 0xe0419ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cf1c0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecee1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abdf8c r4:85abdc00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abdf8c r4:85458600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cb000 r8:8545862c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458600 r8:8027ed34 r7:ececde60 r6:85458680 r5:852cb000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced1fb0 to 0xeced1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e7100 INFO: task kworker/0:708:6492 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8428f000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:709:6493 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:709 state:D stack:0 pid:6493 tgid:6493 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:eceddd84 r8:00000002 r7:60000013 r6:eceddd8c r5:852cec00 [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:852cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abdb8c r4:85abd800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abdb8c r4:85458800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cec00 r8:8545882c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458800 r8:8027ed34 r7:eced1e60 r6:85458880 r5:852cec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeceddfb0 to 0xeceddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853e7cc0 INFO: task kworker/0:710:6496 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8446e000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:965 state:D stack:0 pid:6497 tgid:6497 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ecea5d84 r8:00000002 r7:60000113 r6:ecea5d8c r5:85a08c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea5e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cf400 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a08c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecef1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abe78c r4:85abe400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abe78c r4:85458900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a08c00 r8:8545892c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458900 r8:8027ed34 r7:eced1e60 r6:851f5f00 r5:85a08c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecea5fb0 to 0xecea5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853cf180 INFO: task kworker/0:711:6500 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8446e000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e0419dc0 r5:00001000 r4:ee065000 r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:712:6501 blocked for more than 479 seconds. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cf380 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a0a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceeb000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abe38c r4:85abe000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abe38c r4:85458980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a0a400 r8:854589ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85458980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458980 r8:8027ed34 r7:ecea5e60 r6:851f5f80 r5:85a0a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecee9fb0 to 0xecee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853cf000 INFO: task kworker/0:712:6501 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0419d20 to 0xe0419d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:713:6505 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:713 state:D stack:0 pid:6505 tgid:6505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf09d84 r8:00000002 r7:60000113 r6:ecf09d8c r5:85a0c800 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecf09fb0 to 0xecf09ff8) r4:853cf000 INFO: task kworker/0:713:6505 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 84cbe000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:714:6506 blocked for more than 479 seconds. r4:85a0d400 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:85a0d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 r10:61c88647 r9:85a0d400 r8:85458aac r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 r4:00000000 r5:8487af8c r4:8487ac00 r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf21e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cf740 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a0bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf17000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abf38c r4:85abf000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abf38c r4:85458b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a0bc00 r8:85458b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458b00 r8:8027ed34 r7:ecf0de60 r6:8543e100 r5:85a0bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf21fb0 to 0xecf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853cf780 INFO: task kworker/0:715:6509 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 84f2f000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8487af8c r4:8487ac00 9fa0: 00000000 00000000 00000000 00000000 r10:829187f4 r9:ecf25d84 r8:00000002 r7:60000113 r6:ecf25d8c r5:85a0e000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85abfb8c r4:85abf800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85abfb8c r4:85458b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a0e000 r8:85458bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85458b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458b80 r8:8027ed34 r7:ecf21e60 r6:8543e180 r5:85a0e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf25fb0 to 0xecf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853cf780 INFO: task kworker/0:716:6510 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:800b0013 r4:80239bd0 r4:e0419dc0 r5:8487af8c r4:8487ac00 r4:84af8380 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecf29fb0 to 0xecf29ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8527a000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:718:6514 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:718 state:D stack:0 pid:6514 tgid:6514 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf45d84 r8:00000002 r7:60000113 r6:ecf45d8c r5:859fd400 r4:859fd400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859fd400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf45e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cfd00 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf4b000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac438c r4:85ac4000 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac438c r4:85458c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859fd400 r8:85458cac r7:82804d40 r6:dddced40 r5:dddced60 r4:85458c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458c80 r8:8027ed34 r7:ecf25e60 r6:8543e280 r5:859fd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf45fb0 to 0xecf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:853cfa40 INFO: task kworker/0:718:6514 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 855be000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:85a10c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 r10:61c88647 r9:85a10c00 r8:85458d2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8487af8c r4:8487ac00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:84af1d40 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf5de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853cfe80 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a11800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf51000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac478c r4:85ac4400 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac478c r4:85458d80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 r5:00001000 r4:ee065000 r4:84af8380 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:721:6520 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:721 state:D stack:0 pid:6520 tgid:6520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf69d84 r8:00000002 r7:60000013 r6:ecf69d8c r5:85a13000 r4:85a13000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a13000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf69e08 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85ac6b8c r4:85458e00 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r4:00000000 r5:8487af8c r4:8487ac00 r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:722:6521 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:722 state:D stack:0 pid:6521 tgid:6521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf6dd84 r8:00000002 r7:60000113 r6:ecf6dd8c r5:85a10000 r4:85a10000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a10000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf6de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8500 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a10000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf6f000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac4b8c r4:85ac4800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac4b8c r4:85458e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a10000 r8:85458eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85458e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0419d20 to 0xe0419d68) r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a15400 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a15400 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf85e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853e7100 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a15400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf75000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac4f8c r4:85ac4c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac4f8c r4:85458f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a15400 r8:85458f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85458f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85458f00 r8:8027ed34 r7:ecf69e60 r6:8543e500 r5:85a15400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf85fb0 to 0xecf85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Call trace: Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 85e52000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 r5:8487af8c r4:8487ac00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a12400 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85ac538c r4:85458f80 Exception stack(0xecf89fb0 to 0xecf89ff8) task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 8609f000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 Not tainted 6.15.0-syzkaller #0 r5:85a14800 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85563040 r10:61c88647 r9:85a14800 r8:8555102c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 r4:00000000 r5:8487af8c r4:8487ac00 r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:726:6529 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:726 state:D stack:0 pid:6529 tgid:6529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecfadd84 r8:00000002 r7:60000013 r6:ecfadd8c r5:85a13c00 r4:85a13c00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a13c00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecfade08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855631c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa3000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac5b8c r4:85ac5800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac5b8c r4:85551080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0419d20 to 0xe0419d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85563280 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a0b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfa9000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac5f8c r4:85ac5c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac5f8c r4:85551100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a0b000 r8:8555112c r7:82804d40 r6:dddced40 r5:dddced60 r4:85551100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85551100 r8:8027ed34 r7:ecf69e60 r6:8543e700 r5:85a0b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfb9fb0 to 0xecfb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85563180 INFO: task kworker/0:727:6531 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 867c2000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:00000000 r5:8487af8c r4:8487ac00 r4:84af8380 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:85a16c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 r4:85551180 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 86af7000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee065000 r5:8487af8c r4:8487ac00 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:729 state:D stack:0 pid:6536 tgid:6536 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r9:83018005 r8:85ae8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 Not tainted 6.15.0-syzkaller #0 r5:85ae9800 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85563780 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecfe1000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac6f8c r4:85ac6c00 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac6f8c r4:85551280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae9800 r8:855512ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85551280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85551280 r8:8027ed34 r7:ecf69e60 r6:8543e880 r5:85ae9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecfe5fb0 to 0xecfe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85563540 INFO: task kworker/0:730:6537 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 86d28000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r9:83018205 r8:8482ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f531000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85ac738c r4:85551300 Exception stack(0xecff1fb0 to 0xecff1ff8) Call trace: 9d60: 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r7:ddde2d40 r6:83018200 r5:8487af8c r4:84af8380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:732:6542 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:732 state:D stack:0 pid:6542 tgid:6542 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecffdd84 r8:00000002 r7:60000013 r6:ecffdd8c r5:85ae8000 r4:85ae8000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ae8000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecffde08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85563a40 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecff9000 [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecffdfb0 to 0xecffdff8) task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:84af8380 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8546ed00 r7:dddced40 r6:83018000 r5:85ac838c r4:85551400 r4:00000001 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 r5:00001000 r4:ee065000 r4:84af8380 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:734:6545 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:734 state:D stack:0 pid:6545 tgid:6545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecf05d84 r8:00000002 r7:60000113 r6:ecf05d8c r5:85a5e000 r4:85a5e000 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85a5e000 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecf05e08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85563bc0 r4:00000000 [<804e8e70>] (vfree) from [<8054a194>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85a5e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed007000 [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6ec4>] (bpf_jit_free_exec) from [<803c72b4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c724c>] (bpf_jit_free) from [<803c8344>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85ac7b8c r4:85ac7800 [<803c81f8>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85ac7b8c r4:85551480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85a5e000 r8:855514ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85551480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85551480 r8:8027ed34 r7:ed011e60 r6:85551500 r5:85a5e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecf05fb0 to 0xecf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85563a80 INFO: task kworker/0:734:6545 is blocked on a mutex likely owned by task kworker/1:101:3662. task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a61814>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8482ec00 r8:80200be4 r7:e0419d54 r6:ffffffff r5:8482ec00 r4:00000000 [<81a617d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0419d20 to 0xe0419d68) 9d20: 876e7000 dffdd000 00000001 80239bb8 7f531000 00000001 82ac11c4 82ac05a0 9d40: 7f531000 dffdd000 8280c9b4 e0419d9c e0419da0 e0419d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4eb0>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4c2c>] (__purge_vmap_area_lazy) from [<804e5268>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0419dc0 r5:e0419e08 r4:e0419dc0 [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dc2c0 r4:00000000 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a5a400 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 task:kworker/1:101 state:R running task stack:0 pid:3662 tgid:3662 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e0419dc0 [<8054a164>] (execmem_free) from [<803c6ed4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:8482ec00 r8:84af83ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84af8380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af8380 r8:8027ed34 r7:e0429e60 r6:84ae2380 r5:8482ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0419fb0 to 0xe0419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84af1d40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:736:6550 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:736 state:D stack:0 pid:6550 tgid:6550 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60458>] (__schedule) from [<81a613e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60458>] (__schedule) from [<81a613e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ed01dd84 r8:00000002 r7:60000013 r6:ed01dd8c r5:852cbc00 r4:852cbc00 [<81a613b4>] (schedule) from [<81a617c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:852cbc00 r4:829187f0 [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a617b0>] (schedule_preempt_disabled) from [<81a63eac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a63bac>] (__mutex_lock.constprop.0) from [<81a64378>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ed01de08 r4:00000000 [<81a64364>] (__mutex_lock_slowpath) from [<81a643b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6437c>] (mutex_lock) from [<804e50ec>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e5084>] (_vm_unmap_aliases) from [<804e8fdc>] (vfree+0x16c/0x210 mm/vmalloc.c:3414)