Extracting prog: 7m25.738231455s Minimizing prog: 1h51m14.545862374s Simplifying prog options: 0s Extracting C: 8m42.581634115s Simplifying C: 58m31.430889429s extracting reproducer from 1 programs testing a last program of every proc single: executing 1 programs separately with timeout 45s testing program (duration=45s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000e40)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0200000002"], 0x10) program did not crash single: failed to extract reproducer single: executing 1 programs separately with timeout 16m0s testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD-bpf$BPF_PROG_DETACH detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000e40)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="0200000002"], 0x10) program crashed: lost connection to test machine single: successfully extracted reproducer found reproducer with 4 syscalls minimizing guilty program testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root-bpf$PROG_LOAD detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-openat$cgroup_root detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$BPF_TASK_FD_QUERY-bpf$PROG_LOAD detailed listing: executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) program crashed: INFO: task hung in _vm_unmap_aliases testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash testing program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD detailed listing: executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) program did not crash extracting C reproducer testing compiled C program (duration=16m0s, {Threaded:true Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases simplifying C reproducer testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:2 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox:none SandboxArg:0 Leak:false NetInjection:true NetDevices:true NetReset:true Cgroups:true BinfmtMisc:true CloseFDs:true KCSAN:false DevlinkPCI:false NicVF:false USB:true VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:true UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:true HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:true Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:true Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases testing compiled C program (duration=16m0s, {Threaded:false Repeat:true RepeatTimes:0 Procs:1 Slowdown:10 Sandbox: SandboxArg:0 Leak:false NetInjection:false NetDevices:false NetReset:false Cgroups:false BinfmtMisc:false CloseFDs:false KCSAN:false DevlinkPCI:false NicVF:false USB:false VhciInjection:false Wifi:false IEEE802154:false Sysctl:false Swap:false UseTmpDir:false HandleSegv:false Trace:false LegacyOptions:{Collide:false Fault:false FaultCall:0 FaultNth:0}}): bpf$PROG_LOAD program crashed: INFO: task hung in _vm_unmap_aliases reproducing took 3h5m54.296665963s repro crashed as (corrupted=false): INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df83dd84 r8:00000002 r7:60000113 r6:df83dd8c r5:8323e000 r4:8323e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b293c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323e000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca4d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a81b8c r4:85a81800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a81b8c r4:830b8400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323e000 r8:830b842c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027ed34 r7:df819e48 r6:830b8480 r5:8323e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830b7180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/0:1:10 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:10 tgid:10 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df841d84 r8:00000002 r7:60000113 r6:df841d8c r5:8323ec00 r4:8323ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8323ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df841e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b477c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8323ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec941000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a86b8c r4:85a86800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a86b8c r4:830b8500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8323ec00 r8:830b852c r7:82804d40 r6:dddced40 r5:dddced60 r4:830b8500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8500 r8:8027ed34 r7:df83de60 r6:830b8600 r5:8323ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf841fb0 to 0xdf841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:830b7180 INFO: task kworker/0:1:10 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/1:2:911 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:911 tgid:911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:e0711d84 r8:00000002 r7:60000113 r6:e0711d8c r5:83a82400 r4:83a82400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a82400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0711e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847eccc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a82400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabcf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ce78c r4:850ce400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850ce78c r4:8402d580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a82400 r8:8402d5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8402d580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8402d580 r8:8027ed34 r7:df879e60 r6:83c74780 r5:83a82400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0711fb0 to 0xe0711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8402a9c0 INFO: task kworker/1:2:911 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/1:3:1794 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:1794 tgid:1794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eb161d84 r8:00000002 r7:60000113 r6:eb161d8c r5:83a92400 r4:83a92400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a92400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fbf40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a92400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88e1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855ce78c r4:855ce400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855ce78c r4:841de580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a92400 r8:841de5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:841de580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:841de580 r8:8027ed34 r7:df951e60 r6:83c84400 r5:83a92400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb161fb0 to 0xeb161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:841dcb80 INFO: task kworker/1:3:1794 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/0:5:3116 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3116 tgid:3116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:844fe000 r4:844fe000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:844fe000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8478e380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:844fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df975000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85062f8c r4:85062c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85062f8c r4:849c1680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844fe000 r8:849c16ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1680 r8:8027ed34 r7:df95de60 r6:84765e80 r5:844fe000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84954840 INFO: task kworker/0:5:3116 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/1:4:3122 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df99dd84 r8:00000002 r7:60000013 r6:df99dd8c r5:840f4800 r4:840f4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:840f4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df99de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ea980 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:840f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8502a78c r4:8502a400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8502a78c r4:84765c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:840f4800 r8:84765cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84765c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84765c80 r8:8027ed34 r7:eb161e60 r6:84765a00 r5:840f4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf99dfb0 to 0xdf99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759080 INFO: task kworker/1:4:3122 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/0:8:3124 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa05d84 r8:00000002 r7:60000013 r6:dfa05d8c r5:83a80000 r4:83a80000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a80000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847d3480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a80000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df96f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505478c r4:85054400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8505478c r4:849c1580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a80000 r8:849c15ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1580 r8:8027ed34 r7:df9d9e60 r6:84765b00 r5:83a80000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84954cc0 INFO: task kworker/0:8:3124 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/1:5:3126 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:df959d84 r8:00000002 r7:60000113 r6:df959d8c r5:83a80c00 r4:83a80c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a80c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df959e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b6a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a80c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead17000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cf38c r4:850cf000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:850cf38c r4:84765a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a80c00 r8:84765aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84765a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84765a80 r8:8027ed34 r7:eb161e60 r6:84765700 r5:83a80c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf959fb0 to 0xdf959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759240 INFO: task kworker/1:5:3126 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/0:9:3128 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa1dd84 r8:00000002 r7:60000013 r6:dfa1dd8c r5:83a85400 r4:83a85400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a85400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847dc300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a85400 r7:00000000 r6:83018000 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8506378c r4:85063400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8506378c r4:849c1800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a85400 r8:849c182c r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1800 r8:8027ed34 r7:df9d9e60 r6:84765780 r5:83a85400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa1dfb0 to 0xdfa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84954e00 INFO: task kworker/0:9:3128 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 INFO: task kworker/0:10:3130 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:83a86c00 r4:83a86c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a86c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85591580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a86c00 r7:00000000 r6:83018000 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:83ea178c r4:83ea1400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:83ea178c r4:849c1480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a86c00 r8:849c14ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1480 r8:8027ed34 r7:dfa1de60 r6:84765280 r5:83a86c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84954d80 INFO: task kworker/0:10:3130 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3131 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa39d84 r8:00000002 r7:60000113 r6:dfa39d8c r5:833aa400 r4:833aa400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:833aa400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8562e840 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:833aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e068b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:856bbb8c r4:856bb800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:856bbb8c r4:849c1880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833aa400 r8:849c18ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1880 r8:8027ed34 r7:dfa29e60 r6:849c1a00 r5:833aa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa39fb0 to 0xdfa39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849dc080 INFO: task kworker/0:11:3131 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:6:3136 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:83a6b000 r4:83a6b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a6b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ef7c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a6b000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9b1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844d3b8c r4:844d3800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844d3b8c r4:84765180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a6b000 r8:847651ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84765180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84765180 r8:8027ed34 r7:eb161e60 r6:849c1a80 r5:83a6b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759680 INFO: task kworker/1:6:3136 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3137 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa69d84 r8:00000002 r7:60000013 r6:dfa69d8c r5:8324a400 r4:8324a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8324a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85213c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8324a400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab43000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521d38c r4:8521d000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8521d38c r4:84765000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8324a400 r8:8476502c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84765000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84765000 r8:8027ed34 r7:eb161e60 r6:849c1b00 r5:8324a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759700 INFO: task kworker/1:7:3137 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3139 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa75d84 r8:00000002 r7:60000113 r6:dfa75d8c r5:8382b000 r4:8382b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8382b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8534b940 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8382b000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe17000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8521e78c r4:8521e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8521e78c r4:830cd100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8382b000 r8:830cd12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd100 r8:8027ed34 r7:eb161e60 r6:849c1b80 r5:8382b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa75fb0 to 0xdfa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847598c0 INFO: task kworker/1:8:3139 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3140 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:83a63000 r4:83a63000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a63000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85384cc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a63000 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2ef000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540838c r4:85408000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540838c r4:830cd080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a63000 r8:830cd0ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:830cd080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027ed34 r7:eb161e60 r6:849c1c00 r5:83a63000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759b00 INFO: task kworker/1:9:3140 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3143 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3143 tgid:3143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa95d84 r8:00000002 r7:60000113 r6:dfa95d8c r5:83a62400 r4:83a62400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a62400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85397cc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a62400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0633000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85409b8c r4:85409800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85409b8c r4:83895800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a62400 r8:8389582c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83895800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83895800 r8:8027ed34 r7:eb161e60 r6:849c1c80 r5:83a62400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa95fb0 to 0xdfa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759a80 INFO: task kworker/1:10:3143 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3144 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:83a66c00 r4:83a66c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a66c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538ed40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a66c00 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa77000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8540bf8c r4:8540bc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8540bf8c r4:8385a400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a66c00 r8:8385a42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8385a400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8385a400 r8:8027ed34 r7:eb161e60 r6:849c1d00 r5:83a66c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759b40 INFO: task kworker/1:11:3144 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3147 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:83a8c800 r4:83a8c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a8c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853b02c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa01000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85494f8c r4:85494c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85494f8c r4:8385a380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a8c800 r8:8385a3ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8385a380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8385a380 r8:8027ed34 r7:eb161e60 r6:849c1d80 r5:83a8c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759d00 INFO: task kworker/1:12:3147 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3148 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:83a65400 r4:83a65400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a65400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855dd2c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a65400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855b578c r4:855b5400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:855b578c r4:83bf0480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a65400 r8:83bf04ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:83bf0480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83bf0480 r8:8027ed34 r7:eb161e60 r6:849c1e00 r5:83a65400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84759d80 INFO: task kworker/1:13:3148 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3151 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:83a8d400 r4:83a8d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a8d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85524c80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a8d400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab31000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8542478c r4:85424400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8542478c r4:845d9000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a8d400 r8:845d902c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9000 r8:8027ed34 r7:eb161e60 r6:849c1e80 r5:83a8d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b1000 INFO: task kworker/1:14:3151 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3153 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa61d84 r8:00000002 r7:60000113 r6:dfa61d8c r5:83a81800 r4:83a81800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a81800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85647300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab5d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85424b8c r4:85424800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85424b8c r4:845d9080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a81800 r8:845d90ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9080 r8:8027ed34 r7:eb161e60 r6:845d9100 r5:83a81800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b1000 INFO: task kworker/1:15:3153 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3155 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfad1d84 r8:00000002 r7:60000013 r6:dfad1d8c r5:83a68c00 r4:83a68c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a68c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857216c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85694f8c r4:85694c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85694f8c r4:845d9180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a68c00 r8:845d91ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9180 r8:8027ed34 r7:eb161e60 r6:845d9200 r5:83a68c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b1000 INFO: task kworker/1:16:3155 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3156 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:83838000 r4:83838000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83838000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8563aac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83838000 r7:00000000 r6:83018200 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:847e7f8c r4:847e7c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:847e7f8c r4:845d9280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83838000 r8:845d92ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9280 r8:8027ed34 r7:dfad1e60 r6:845d9300 r5:83838000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b1000 INFO: task kworker/1:17:3156 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3159 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:8383b000 r4:8383b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8383b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85721040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8383b000 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb543000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85694b8c r4:85694800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85694b8c r4:845d9380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8383b000 r8:845d93ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9380 r8:8027ed34 r7:dfad1e60 r6:845d9400 r5:8383b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b1600 INFO: task kworker/1:18:3159 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3161 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:84288c00 r4:84288c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84288c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84420f80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84288c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec95d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d4f8c r4:857d4c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d4f8c r4:845d9480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84288c00 r8:845d94ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9480 r8:8027ed34 r7:dfad1e60 r6:845d9500 r5:84288c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b1840 INFO: task kworker/1:19:3161 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3163 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb25d84 r8:00000002 r7:60000113 r6:dfb25d8c r5:8428d400 r4:8428d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8428d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85725f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8428d400 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc77000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85796f8c r4:85796c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85796f8c r4:845d9580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8428d400 r8:845d95ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9580 r8:8027ed34 r7:dfaede60 r6:845d9600 r5:8428d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb25fb0 to 0xdfb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b18c0 INFO: task kworker/1:20:3163 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3164 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3164 tgid:3164 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:8383a400 r4:8383a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8383a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85572ac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8383a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec567000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577138c r4:85771000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577138c r4:849c1f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8383a400 r8:849c1f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1f00 r8:8027ed34 r7:dfa29e60 r6:845d9680 r5:8383a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849dc2c0 INFO: task kworker/0:12:3164 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3167 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb39d84 r8:00000002 r7:60000113 r6:dfb39d8c r5:84108000 r4:84108000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84108000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84108000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8138c r4:85a81000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8138c r4:849c1f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84108000 r8:849c1fac r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1f80 r8:8027ed34 r7:dfb29e60 r6:845d9700 r5:84108000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb39fb0 to 0xdfb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849dc880 INFO: task kworker/0:13:3167 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3168 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3168 tgid:3168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb45d84 r8:00000002 r7:60000113 r6:dfb45d8c r5:84109800 r4:84109800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84109800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85514640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84109800 r7:00000000 r6:83018000 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfae3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8577338c r4:85773000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8577338c r4:849c1400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84109800 r8:849c142c r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1400 r8:8027ed34 r7:dfb39e60 r6:845d9780 r5:84109800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84954ec0 INFO: task kworker/0:14:3168 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:8410e000 r4:8410e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8410e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29700 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8410e000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecabf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8278c r4:85a82400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8278c r4:849c1380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8410e000 r8:849c13ac r7:82804d40 r6:dddced40 r5:dddced60 r4:849c1380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849c1380 r8:8027ed34 r7:dfb39e60 r6:845d9800 r5:8410e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84954ec0 INFO: task kworker/0:15:3170 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bc557000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3173 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb49d84 r8:00000002 r7:60000113 r6:dfb49d8c r5:84108c00 r4:84108c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84108c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8499e080 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84108c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb853000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:858c2f8c r4:858c2c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:858c2f8c r4:845d9880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84108c00 r8:845d98ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9880 r8:8027ed34 r7:dfaede60 r6:845d9900 r5:84108c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb49fb0 to 0xdfb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b19c0 INFO: task kworker/1:21:3173 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3175 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb15d84 r8:00000002 r7:60000013 r6:dfb15d8c r5:8410a400 r4:8410a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8410a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595fac0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8410a400 r7:00000000 r6:83018200 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab53000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d6f8c r4:857d6c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:857d6f8c r4:845d9980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8410a400 r8:845d99ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9980 r8:8027ed34 r7:dfb49e60 r6:845d9a00 r5:8410a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e000 INFO: task kworker/1:22:3175 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3177 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb69d84 r8:00000002 r7:60000013 r6:dfb69d8c r5:8410b000 r4:8410b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8410b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb69e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ecf80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8410b000 r7:00000000 r6:83018200 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a26b8c r4:85a26800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a26b8c r4:845d9a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8410b000 r8:845d9aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9a80 r8:8027ed34 r7:dfb15e60 r6:845d9b00 r5:8410b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb69fb0 to 0xdfb69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e180 INFO: task kworker/1:23:3177 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3180 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb75d84 r8:00000002 r7:60000113 r6:dfb75d8c r5:8410d400 r4:8410d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8410d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85966000 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8410d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844dbf8c r4:844dbc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844dbf8c r4:845d9b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8410d400 r8:845d9bac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9b80 r8:8027ed34 r7:dfb69e60 r6:845d9c00 r5:8410d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb75fb0 to 0xdfb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e280 INFO: task kworker/1:24:3180 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3181 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb81d84 r8:00000002 r7:60000113 r6:dfb81d8c r5:84289800 r4:84289800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84289800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8595b400 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84289800 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a25b8c r4:85a25800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a25b8c r4:845d9c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84289800 r8:845d9cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9c80 r8:8027ed34 r7:dfb69e60 r6:845d9d00 r5:84289800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e280 INFO: task kworker/1:25:3181 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3183 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3183 tgid:3183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb9dd84 r8:00000002 r7:60000113 r6:dfb9dd8c r5:83a8ec00 r4:83a8ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a8ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a1a980 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb769000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7e38c r4:85a7e000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a7e38c r4:845d9d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a8ec00 r8:845d9dac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9d80 r8:8027ed34 r7:dfb69e60 r6:849c1300 r5:83a8ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb9dfb0 to 0xdfb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e600 INFO: task kworker/1:26:3183 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3185 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:83a71800 r4:83a71800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a71800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbd580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a71800 r7:00000000 r6:83018200 r5:00001000 r4:7f1bd000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc31000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531b78c r4:8531b400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8531b78c r4:845d9e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a71800 r8:845d9e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9e00 r8:8027ed34 r7:dfb9de60 r6:842ca280 r5:83a71800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e800 INFO: task kworker/1:27:3185 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:28:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:28 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbc1d84 r8:00000002 r7:60000113 r6:dfbc1d8c r5:84102400 r4:84102400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84102400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8499e740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84102400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a27f8c r4:85a27c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a27f8c r4:845d9e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84102400 r8:845d9eac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9e80 r8:8027ed34 r7:dfba9e60 r6:83363700 r5:84102400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499eb40 INFO: task kworker/1:28:3187 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbc5d84 r8:00000002 r7:60000113 r6:dfbc5d8c r5:84103000 r4:84103000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84103000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84103000 r7:00000000 r6:83018200 r5:00001000 r4:7f133000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e178c r4:844e1400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e178c r4:845d9f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84103000 r8:845d9f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9f00 r8:8027ed34 r7:dfbc1e60 r6:83363680 r5:84103000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499eb40 INFO: task kworker/1:29:3188 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:84105400 r4:84105400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84105400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84105400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca69000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a81f8c r4:85a81c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a81f8c r4:845aa280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84105400 r8:845aa2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:845aa280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845aa280 r8:8027ed34 r7:dfb4de60 r6:845aa380 r5:84105400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849a2740 INFO: task kworker/0:16:3191 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:30:3192 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:30 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:84100c00 r4:84100c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84100c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7640 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84100c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb97000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e1f8c r4:844e1c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e1f8c r4:845d9f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84100c00 r8:845d9fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:845d9f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9f80 r8:8027ed34 r7:dfbc1e60 r6:832a1080 r5:84100c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499ecc0 INFO: task kworker/1:30:3192 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:84101800 r4:84101800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84101800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8499ee80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84101800 r7:00000000 r6:83018200 r5:00001000 r4:7f11b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf77000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e1b8c r4:844e1800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e1b8c r4:84766080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84101800 r8:847660ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766080 r8:8027ed34 r7:dfbd9e60 r6:832a1180 r5:84101800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499ec00 INFO: task kworker/1:31:3194 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:32:3198 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:32 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbe5d84 r8:00000002 r7:60000113 r6:dfbe5d8c r5:84a68000 r4:84a68000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a68000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85352c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a68000 r7:00000000 r6:83018200 r5:00001000 r4:7f26f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecef7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85b9db8c r4:85b9d800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85b9db8c r4:84766100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a68000 r8:8476612c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766100 r8:8027ed34 r7:dfbd9e60 r6:83c74680 r5:84a68000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe5fb0 to 0xdfbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499ecc0 INFO: task kworker/1:32:3198 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:33:3199 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:33 state:D stack:0 pid:3199 tgid:3199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbe9d84 r8:00000002 r7:60000113 r6:dfbe9d8c r5:84a68c00 r4:84a68c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a68c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7700 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a68c00 r7:00000000 r6:83018200 r5:00001000 r4:7f169000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e138c r4:844e1000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e138c r4:84766180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a68c00 r8:847661ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766180 r8:8027ed34 r7:dfbe5e60 r6:832ca680 r5:84a68c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499ecc0 INFO: task kworker/1:33:3199 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:34:3201 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:34 state:D stack:0 pid:3201 tgid:3201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbf1d84 r8:00000002 r7:60000113 r6:dfbf1d8c r5:84a6a400 r4:84a6a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85bbd400 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6a400 r7:00000000 r6:83018200 r5:00001000 r4:7f1bb000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbdb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e278c r4:844e2400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e278c r4:84766200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6a400 r8:8476622c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766200 r8:8027ed34 r7:dfbe5e60 r6:832ca600 r5:84a6a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:849b16c0 INFO: task kworker/1:34:3201 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:35:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:35 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:84a69800 r4:84a69800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a69800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535a380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a69800 r7:00000000 r6:83018200 r5:00001000 r4:7f169000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9a3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e2b8c r4:844e2800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e2b8c r4:84766280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a69800 r8:847662ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766280 r8:8027ed34 r7:dfbe5e60 r6:832ca580 r5:84a69800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f080 INFO: task kworker/1:35:3203 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3205 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc01d84 r8:00000002 r7:60000113 r6:dfc01d8c r5:84a6c800 r4:84a6c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85326b40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6c800 r7:00000000 r6:83018200 r5:00001000 r4:7f22d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c11b8c r4:85c11800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c11b8c r4:84766300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6c800 r8:8476632c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766300 r8:8027ed34 r7:dfbe5e60 r6:84402200 r5:84a6c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc01fb0 to 0xdfc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f180 INFO: task kworker/1:36:3205 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:84a6bc00 r4:84a6bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85cd9f00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f2f1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed22f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c1238c r4:85c12000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c1238c r4:84766380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6bc00 r8:847663ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766380 r8:8027ed34 r7:dfbe5e60 r6:84402180 r5:84a6bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f440 INFO: task kworker/1:37:3208 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3209 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc11d84 r8:00000002 r7:60000113 r6:dfc11d8c r5:84a6e000 r4:84a6e000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8498f480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6e000 r7:00000000 r6:83018200 r5:00001000 r4:7f2c1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed3b3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c4478c r4:85c44400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c4478c r4:84766400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6e000 r8:8476642c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766400 r8:8027ed34 r7:dfc0de60 r6:8477f400 r5:84a6e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc11fb0 to 0xdfc11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f300 INFO: task kworker/1:38:3209 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84a6d400 r4:84a6d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d37500 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6d400 r7:00000000 r6:83018200 r5:00001000 r4:7f33b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed56d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c5438c r4:85c54000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c5438c r4:84766480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6d400 r8:847664ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766480 r8:8027ed34 r7:dfc0de60 r6:8477f080 r5:84a6d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f800 INFO: task kworker/1:39:3212 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:84a6ec00 r4:84a6ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85379c40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f3d9000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed601000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c1378c r4:85c13400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c1378c r4:84766500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6ec00 r8:8476652c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766500 r8:8027ed34 r7:dfc1de60 r6:8497e000 r5:84a6ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f780 INFO: task kworker/1:40:3214 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3215 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:84a6b000 r4:84a6b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a6b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85379840 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84a6b000 r7:00000000 r6:83018200 r5:00001000 r4:7f3fb000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed7f5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c13b8c r4:85c13800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c13b8c r4:84766580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a6b000 r8:847665ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766580 r8:8027ed34 r7:dfc21e60 r6:8497e080 r5:84a6b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f780 INFO: task kworker/1:41:3215 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc15d84 r8:00000002 r7:60000013 r6:dfc15d8c r5:83a90000 r4:83a90000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a90000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85379240 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a90000 r7:00000000 r6:83018200 r5:00001000 r4:7f39b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa33000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c1338c r4:85c13000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c1338c r4:84766600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a90000 r8:8476662c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766600 r8:8027ed34 r7:dfc21e60 r6:84766680 r5:83a90000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f880 INFO: task kworker/1:42:3218 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3219 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfae1d84 r8:00000002 r7:60000013 r6:dfae1d8c r5:83a91800 r4:83a91800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a91800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d72c40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a91800 r7:00000000 r6:83018200 r5:00001000 r4:7f45b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed93b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c13f8c r4:85c13c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c13f8c r4:84766700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a91800 r8:8476672c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766700 r8:8027ed34 r7:dfc15e60 r6:84766780 r5:83a91800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae1fb0 to 0xdfae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498f880 INFO: task kworker/1:43:3219 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3223 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc55d84 r8:00000002 r7:60000113 r6:dfc55d8c r5:83a96000 r4:83a96000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a96000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85379d00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a96000 r7:00000000 r6:83018200 r5:00001000 r4:7f3f3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed77b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85c6b78c r4:85c6b400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85c6b78c r4:84766800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a96000 r8:8476682c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766800 r8:8027ed34 r7:dfae1e60 r6:84766880 r5:83a96000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc55fb0 to 0xdfc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498fe00 INFO: task kworker/1:44:3223 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3225 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:83a93000 r4:83a93000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a93000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e106c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a93000 r7:00000000 r6:83018200 r5:00001000 r4:7f527000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda0b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85dc2b8c r4:85dc2800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85dc2b8c r4:84766900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a93000 r8:8476692c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766900 r8:8027ed34 r7:dfae1e60 r6:84766980 r5:83a93000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498fb80 INFO: task kworker/1:45:3225 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3226 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3226 tgid:3226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:83a93c00 r4:83a93c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a93c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849940c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f467000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed725000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e578c r4:844e5400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e578c r4:84766a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a93c00 r8:84766a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766a00 r8:8027ed34 r7:dfc61e60 r6:84766a80 r5:83a93c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498fb80 INFO: task kworker/1:46:3226 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:3228 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:3228 tgid:3228 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc71d84 r8:00000002 r7:60000113 r6:dfc71d8c r5:83a95400 r4:83a95400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a95400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849a2f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:83a95400 r7:00000000 r6:83018200 r5:00001000 r4:7f4b7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbf3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e5b8c r4:844e5800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e5b8c r4:84766b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a95400 r8:84766b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766b00 r8:8027ed34 r7:dfc61e60 r6:84766b80 r5:83a95400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994100 INFO: task kworker/1:47:3228 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3230 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:84240c00 r4:84240c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84240c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e10f80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84240c00 r7:00000000 r6:83018200 r5:00001000 r4:7f581000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed333000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e5f8c r4:844e5c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e5f8c r4:84766c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84240c00 r8:84766c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766c00 r8:8027ed34 r7:dfc61e60 r6:84766c80 r5:84240c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994440 INFO: task kworker/1:48:3230 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3233 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc91d84 r8:00000002 r7:60000113 r6:dfc91d8c r5:84242400 r4:84242400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84242400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84994a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84242400 r7:00000000 r6:83018200 r5:00001000 r4:7f57f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed20d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e638c r4:844e6000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e638c r4:84766d00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84242400 r8:84766d2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766d00 r8:8027ed34 r7:dfc85e60 r6:84766d80 r5:84242400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc91fb0 to 0xdfc91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994680 INFO: task kworker/1:49:3233 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3235 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3235 tgid:3235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc9dd84 r8:00000002 r7:60000013 r6:dfc9dd8c r5:84243000 r4:84243000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84243000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e10140 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84243000 r7:00000000 r6:83018200 r5:00001000 r4:7f57d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf59000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e678c r4:844e6400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e678c r4:84766e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84243000 r8:84766e2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766e00 r8:8027ed34 r7:dfc91e60 r6:84766e80 r5:84243000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc9dfb0 to 0xdfc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994880 INFO: task kworker/1:50:3235 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bca98000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:51:3237 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:3237 tgid:3237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfca9d84 r8:00000002 r7:60000113 r6:dfca9d8c r5:84243c00 r4:84243c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84243c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e10680 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f575000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc6d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e6f8c r4:844e6c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e6f8c r4:84766f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84243c00 r8:84766f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84766f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84766f00 r8:8027ed34 r7:dfc9de60 r6:84766f80 r5:84243c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca9fb0 to 0xdfca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994a80 INFO: task kworker/1:51:3237 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3239 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcb5d84 r8:00000002 r7:60000113 r6:dfcb5d8c r5:84244800 r4:84244800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84244800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ed300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84244800 r7:00000000 r6:83018200 r5:00001000 r4:7f579000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcc9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e738c r4:844e7000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e738c r4:84991000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84244800 r8:8499102c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991000 r8:8027ed34 r7:dfca9e60 r6:84991080 r5:84244800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb5fb0 to 0xdfcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994c80 INFO: task kworker/1:52:3239 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3240 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcb9d84 r8:00000002 r7:60000113 r6:dfcb9d8c r5:84240000 r4:84240000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84240000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8498d280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84240000 r7:00000000 r6:83018200 r5:00001000 r4:7f57b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e6b8c r4:844e6800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e6b8c r4:84991100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84240000 r8:8499112c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991100 r8:8027ed34 r7:dfcb5e60 r6:84991180 r5:84240000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb9fb0 to 0xdfcb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84994940 INFO: task kworker/1:53:3240 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3243 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcd5d84 r8:00000002 r7:60000013 r6:dfcd5d8c r5:84245400 r4:84245400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84245400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85e10d40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84245400 r7:00000000 r6:83018200 r5:00001000 r4:7f577000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e778c r4:844e7400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e778c r4:84991200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84245400 r8:8499122c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991200 r8:8027ed34 r7:dfcb5e60 r6:84991280 r5:84245400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd5fb0 to 0xdfcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498d180 INFO: task kworker/1:54:3243 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3244 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3244 tgid:3244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfbddd84 r8:00000002 r7:60000013 r6:dfbddd8c r5:84246000 r4:84246000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84246000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ef440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84246000 r7:00000000 r6:83018200 r5:00001000 r4:7f619000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed749000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85f21f8c r4:85f21c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85f21f8c r4:84991300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84246000 r8:8499132c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991300 r8:8027ed34 r7:dfcd5e60 r6:84991380 r5:84246000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498d180 INFO: task kworker/1:55:3244 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3246 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3246 tgid:3246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcddd84 r8:00000002 r7:60000113 r6:dfcddd8c r5:84241800 r4:84241800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84241800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85390c80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84241800 r7:00000000 r6:83018200 r5:00001000 r4:7f575000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd01000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85e8bf8c r4:85e8bc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85e8bf8c r4:84991400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84241800 r8:8499142c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991400 r8:8027ed34 r7:dfbdde60 r6:84991480 r5:84241800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498d0c0 INFO: task kworker/1:56:3246 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3248 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfcf5d84 r8:00000002 r7:60000113 r6:dfcf5d8c r5:84518000 r4:84518000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84518000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29940 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84518000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb89000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a82f8c r4:85a82c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a82f8c r4:8497e180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84518000 r8:8497e1ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e180 r8:8027ed34 r7:dfb4de60 r6:84991500 r5:84518000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf5fb0 to 0xdfcf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed240 INFO: task kworker/0:17:3248 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3250 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:84519800 r4:84519800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84519800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84519800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8438c r4:85a84000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8438c r4:8497e200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84519800 r8:8497e22c r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e200 r8:8027ed34 r7:dfcf5e60 r6:84991580 r5:84519800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd05fb0 to 0xdfd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed400 INFO: task kworker/0:18:3250 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3251 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3251 tgid:3251 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd09d84 r8:00000002 r7:60000113 r6:dfd09d8c r5:8451a400 r4:8451a400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8451a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd09e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8451a400 r7:00000000 r6:83018000 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8338c r4:85a83000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8338c r4:8497e280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8451a400 r8:8497e2ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e280 r8:8027ed34 r7:dfd05e60 r6:84991600 r5:8451a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd09fb0 to 0xdfd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed400 INFO: task kworker/0:19:3251 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3253 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd11d84 r8:00000002 r7:60000113 r6:dfd11d8c r5:8451bc00 r4:8451bc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8451bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd11e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8451bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae7f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a8378c r4:85a83400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a8378c r4:8497e300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8451bc00 r8:8497e32c r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e300 r8:8027ed34 r7:dfd05e60 r6:84991680 r5:8451bc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd11fb0 to 0xdfd11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed540 INFO: task kworker/0:20:3253 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3254 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3254 tgid:3254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd21d84 r8:00000002 r7:60000113 r6:dfd21d8c r5:8451c800 r4:8451c800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8451c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29c80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8451c800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb60d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a83b8c r4:85a83800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a83b8c r4:8497e380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8451c800 r8:8497e3ac r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e380 r8:8027ed34 r7:dfd05e60 r6:84991700 r5:8451c800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd21fb0 to 0xdfd21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed540 INFO: task kworker/0:21:3254 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3258 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfc41d84 r8:00000002 r7:60000013 r6:dfc41d8c r5:83a73000 r4:83a73000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:83a73000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b29d80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:83a73000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb81d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a83f8c r4:85a83c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a83f8c r4:8497e400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a73000 r8:8497e42c r7:82804d40 r6:dddced40 r5:dddced60 r4:8497e400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497e400 r8:8027ed34 r7:dfd05e60 r6:8497e480 r5:83a73000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ed780 INFO: task kworker/0:22:3258 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:3260 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:3260 tgid:3260 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd41d84 r8:00000002 r7:60000113 r6:dfd41d8c r5:84518c00 r4:84518c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84518c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd41e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84760080 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84518c00 r7:00000000 r6:83018200 r5:00001000 r4:7f61b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed83f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85f2238c r4:85f22000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85f2238c r4:84991780 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84518c00 r8:849917ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:84991780 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84991780 r8:8027ed34 r7:dfbdde60 r6:84991800 r5:84518c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd41fb0 to 0xdfd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8498d180 INFO: task kworker/1:57:3260 is blocked on a mutex likely owned by task kworker/1:226:3826. task:kworker/1:226 state:R running task stack:0 pid:3826 tgid:3826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:8500b000 r8:80200be4 r7:e0721d54 r6:ffffffff r5:8500b000 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0721d20 to 0xe0721d68) 1d20: bd31e000 dfa4f000 00000001 80239bb8 7f849000 00000001 82ac11c4 82ac05a0 1d40: 7f849000 dfa4f000 8280c9b4 e0721d9c e0721da0 e0721d70 80230af4 80239bd0 1d60: 80070013 ffffffff r5:80070013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0721dc0 r5:e0721e08 r4:e0721dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85d05ec0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8500b000 r7:00000000 r6:83018200 r5:00001000 r4:7f849000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ee903000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8602278c r4:86022400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8602278c r4:847da580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8500b000 r8:847da5ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da580 r8:8027ed34 r7:e06b9e60 r6:847da600 r5:8500b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0721fb0 to 0xe0721ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847cce40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:3264 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:dfd35d84 r8:00000002 r7:60000013 r6:dfd35d8c r5:8451d400 r4:8451d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8451d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 <> [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597eb8c r4:8597e800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597eb8c r4:85969e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8588a400 r8:85969e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85969e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85969e00 r8:8027ed34 r7:ecb31e60 r6:85959500 r5:8588a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb6dfb0 to 0xecb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85971800 INFO: task kworker/0:905:6099 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: abe18000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r5:85889800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:907:6101 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:907 state:D stack:0 pid:6101 tgid:6101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb45d84 r8:00000002 r7:60000013 r6:ecb45d8c r5:859b0c00 r4:859b0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593dc00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f019000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab95000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85969f00 r8:8027ed34 r7:ecb71e60 r6:85969f80 r5:859b0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb45fb0 to 0xecb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85971880 INFO: task kworker/0:907:6101 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ac142000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:908:6108 blocked for more than 476 seconds. r5:859b2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597fb8c r4:8597f800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597fb8c r4:859ed000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b2400 r8:859ed02c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ed000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ed000 r8:8027ed34 r7:ecb71e60 r6:859ed080 r5:859b2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb19fb0 to 0xecb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85971f80 INFO: task kworker/0:908:6108 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r4:82ac11e4 r4:00000000 r5:8501378c r4:85013400 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:909:6109 blocked for more than 476 seconds. r5:859b3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:800b0013 r4:80239bd0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:847ccb40 Workqueue: events bpf_prog_free_deferred r5:859b3c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85971fc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb043000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598838c r4:85988000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8598838c r4:859ed200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b3c00 r8:859ed22c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ed200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ed200 r8:8027ed34 r7:eca15e60 r6:859ed280 r5:859b3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca21fb0 to 0xeca21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8499e340 INFO: task kworker/0:910:6110 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ad39f000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 r4:859b4800 r5:859b4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r5:85988b8c r4:85988800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:911:6111 is blocked on a mutex likely owned by task kworker/1:224:3809. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:912:6112 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:912 state:D stack:0 pid:6112 tgid:6112 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca39d84 r8:00000002 r7:60000113 r6:eca39d8c r5:859b5400 r4:859b5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f1900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbf3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598878c r4:85988400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8598878c r4:859ed400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b5400 r8:859ed42c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ed400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ed400 r8:8027ed34 r7:eca2de60 r6:859ed480 r5:859b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca39fb0 to 0xeca39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f1040 INFO: task kworker/0:912:6112 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:800b0013 r4:80239bd0 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:575:6116 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:575 state:D stack:0 pid:6116 tgid:6116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca75d84 r8:00000002 r7:60000113 r6:eca75d8c r5:859b6000 r4:859b6000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca75e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85971440 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844daf8c r4:844dac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844daf8c r4:85959680 r10:00000000 r9:85959680 r8:8027ed34 r7:ecb49e60 r6:859ed580 r5:859b6000 INFO: task kworker/1:575:6116 is blocked on a mutex likely owned by task kworker/1:224:3809. [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 task:kworker/1:576 state:D stack:0 pid:6118 tgid:6118 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:859b8000 r8:8595972c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca99fb0 to 0xeca99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85966c80 INFO: task kworker/1:576:6118 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: adbc9000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:577:6120 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:577 state:D stack:0 pid:6120 tgid:6120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca05d84 r8:00000002 r7:60000013 r6:eca05d8c r5:859b8c00 r4:859b8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca05e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f34c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8585cb8c r4:8585c800 r10:61c88647 r9:859b8c00 r8:859597ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xeca05fb0 to 0xeca05ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:800b0013 r4:80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:00000000 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:847da200 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:913:6122 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:913 state:D stack:0 pid:6122 tgid:6122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eca8dd84 r8:00000002 r7:60000013 r6:eca8dd8c r5:859b9800 r4:859b9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859b9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eca8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f1b00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec76f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85988f8c r4:85988c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85988f8c r4:859ed700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859b9800 r8:859ed72c r7:82804d40 r6:dddced40 r5:dddced60 r4:859ed700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ed700 r8:8027ed34 r7:eca2de60 r6:859ed780 r5:859b9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeca8dfb0 to 0xeca8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f18c0 INFO: task kworker/0:913:6122 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ae023000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:8501378c r4:85013400 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:859ba400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f32c0 INFO: task kworker/1:578:6126 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ae420000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:579:6128 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:579 state:D stack:0 pid:6128 tgid:6128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecae5d84 r8:00000002 r7:60000013 r6:ecae5d8c r5:859bc800 r4:859bc800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859bc800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecae5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f39c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585db8c r4:8585d800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8585db8c r4:85959880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859bc800 r8:859598ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85959880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85959880 r8:8027ed34 r7:ecabde60 r6:859ed880 r5:859bc800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecae5fb0 to 0xecae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f3600 INFO: task kworker/1:579:6128 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ae420000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 r4:847ccb40 Workqueue: events bpf_prog_free_deferred r5:8588bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:8585d38c r4:8585d000 r4:85959900 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:580:6129 is blocked on a mutex likely owned by task kworker/1:224:3809. [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r5:800b0013 r4:80239bd0 r4:e06b9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r5:00001000 r4:dfacd000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:581:6133 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:581 state:D stack:0 pid:6133 tgid:6133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecacdd84 r8:00000002 r7:60000013 r6:ecacdd8c r5:8588d400 r4:8588d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8588d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecacde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f3880 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8588d400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec541000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585d78c r4:8585d400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8585d78c r4:85959a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8588d400 r8:85959a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85959a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85959a00 r8:8027ed34 r7:ecae5e60 r6:85959a80 r5:8588d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecacdfb0 to 0xecacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f3900 INFO: task kworker/1:581:6133 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:e06b9dc0 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ecb85d84 r8:00000002 r7:60000113 r6:ecb85d8c r5:8588e000 r5:8588e000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8585e38c r4:8585e000 r7:ddde2d40 r6:83018200 r5:8585e38c r4:85959b00 r4:85959b00 r4:00000001 5fa0: 00000000 00000000 00000000 00000000 r4:859f3840 INFO: task kworker/1:582:6134 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ae8f0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:583:6135 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:583 state:D stack:0 pid:6135 tgid:6135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecaadd84 r8:00000002 r7:60000113 r6:ecaadd8c r5:8588ec00 r4:8588ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8588ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecaade08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f3c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8588ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec607000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585df8c r4:8585dc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8585df8c r4:85959c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8588ec00 r8:85959c2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85959c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85959c00 r8:8027ed34 r7:ecb85e60 r6:85959c80 r5:8588ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecaadfb0 to 0xecaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f3840 INFO: task kworker/1:583:6135 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: aef7d000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e06b9dc0 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ccb40 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:8588c800 r4:829187f0 r4:00000000 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfa0: 00000000 00000000 00000000 00000000 Call trace: 9d60: 800b0013 ffffffff r4:e06b9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:585:6139 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:585 state:D stack:0 pid:6139 tgid:6139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb91d84 r8:00000002 r7:60000113 r6:ecb91d8c r5:8588b000 r4:8588b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8588b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f3f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8588b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7a9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585e78c r4:8585e400 r4:85959e00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:00000000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:847ccb40 r10:829187f4 r9:ecb95d84 r8:00000002 r7:60000113 r6:ecb95d8c r5:85888c00 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:85888c00 r8:859ed92c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:586:6144 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:586 state:D stack:0 pid:6144 tgid:6144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecb99d84 r8:00000002 r7:60000113 r6:ecb99d8c r5:8591ec00 r4:8591ec00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8591ec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb99e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85958040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:8591ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7d9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585ef8c r4:8585ec00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8585ef8c r4:85959f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8591ec00 r8:85959fac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85959f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85959f80 r8:8027ed34 r7:ecb8de60 r6:85961000 r5:8591ec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb99fb0 to 0xecb99ff8) 9fa0: 00000000 00000000 00000000 00000000 Call trace: r5:800b0013 r4:80239bd0 r4:e06b9dc0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84a9d400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85958440 r7:ddde2d40 r6:83018200 r5:8585f78c r4:85961080 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859582c0 INFO: task kworker/1:587:6147 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: af73e000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8501378c r4:85013400 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:588:6149 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:588 state:D stack:0 pid:6149 tgid:6149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecba5d84 r8:00000002 r7:60000113 r6:ecba5d8c r5:85890000 r4:85890000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85890000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85958280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85890000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7f5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8585f38c r4:8585f000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8585f38c r4:85961180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:85961180 r8:8027ed34 r7:ecb9de60 r6:85961200 r5:85890000 INFO: task kworker/1:588:6149 is blocked on a mutex likely owned by task kworker/1:224:3809. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:00001000 r4:dfacd000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85890c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85958a00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85890c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9bd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586438c r4:85864000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8586438c r4:85961280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85890c00 r8:859612ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961280 r8:8027ed34 r7:ecb9de60 r6:85961300 r5:85890c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba1fb0 to 0xecba1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859582c0 INFO: task kworker/1:589:6150 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 9d60: 800b0013 ffffffff r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 INFO: task kworker/1:590:6151 blocked for more than 477 seconds. r5:85892400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8585fb8c r4:8585f800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8585fb8c r4:85961380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85892400 r8:859613ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961380 r8:8027ed34 r7:ecba1e60 r6:85961400 r5:85892400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbadfb0 to 0xecbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859585c0 INFO: task kworker/1:590:6151 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d60: 800b0013 ffffffff r4:82ac11e4 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 r4:847ccb40 task:kworker/0:915 state:D stack:0 pid:6153 tgid:6153 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:859bd400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594f100 r7:dddced40 r6:83018000 r5:8598938c r4:859ed980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859bd400 r8:859ed9ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859ed980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859ed980 r8:8027ed34 r7:ecb95e60 r6:859eda00 r5:859bd400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb1fb0 to 0xecbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8594f000 INFO: task kworker/0:915:6153 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b0329000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859bb000 r5:859bb000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:859bb000 r8:859614ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 r5:00001000 r4:dfacd000 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:592 state:D stack:0 pid:6157 tgid:6157 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:859be000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca6b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586578c r4:85865400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8586578c r4:85961500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859be000 r8:8596152c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961500 r8:8027ed34 r7:ecba1e60 r6:859edb00 r5:859be000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbb9fb0 to 0xecbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85958800 INFO: task kworker/1:592:6157 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b0bbf000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:593:6158 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:859bec00 r5:859bec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586478c r4:85864400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8586478c r4:85961580 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859bec00 r8:859615ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961580 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961580 r8:8027ed34 r7:ecbb9e60 r6:859edb80 r5:859bec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbbdfb0 to 0xecbbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85958800 INFO: task kworker/1:593:6158 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b0bbf000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:859b6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbc5e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85958980 r4:00000000 9d60: 800b0013 ffffffff r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:595:6163 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:595 state:D stack:0 pid:6163 tgid:6163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbd1d84 r8:00000002 r7:60000013 r6:ecbd1d8c r5:84920000 r4:84920000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84920000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbd1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85958dc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84920000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca29000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85864f8c r4:85864c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85864f8c r4:85961680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84920000 r8:859616ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961680 r8:8027ed34 r7:ecbb9e60 r6:859edc80 r5:84920000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbd1fb0 to 0xecbd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85958c40 INFO: task kworker/1:595:6163 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b1511000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:596 state:D stack:0 pid:6164 tgid:6164 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84922400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r4:85961700 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b1511000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:597:6167 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:597 state:D stack:0 pid:6167 tgid:6167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbe1d84 r8:00000002 r7:60000113 r6:ecbe1d8c r5:84920c00 r4:84920c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84920c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbe1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593d980 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:597:6167 is blocked on a mutex likely owned by task kworker/1:224:3809. [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84921800 r4:829187f0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85961800 r8:8027ed34 r7:ecbe1e60 r6:859ede00 r5:84921800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbe9fb0 to 0xecbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85958e80 INFO: task kworker/1:598:6169 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b1b88000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:ecbedd84 r8:00000002 r7:60000113 r6:ecbedd8c r5:84924800 r5:84924800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85961880 r8:8027ed34 r7:ecbe1e60 r6:859ede80 r5:84924800 Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:84923c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593d280 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84923c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecac1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8586638c r4:85866000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8586638c r4:85961900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84923c00 r8:8596192c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961900 r8:8027ed34 r7:ecbe1e60 r6:859edf00 r5:84923c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf9fb0 to 0xecbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593d1c0 INFO: task kworker/1:600:6173 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b1b88000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:847ccb40 task:kworker/1:601 state:D stack:0 pid:6175 tgid:6175 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84923000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:84923000 r8:859619ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e06b9dc0 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:602:6177 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:602 state:D stack:0 pid:6177 tgid:6177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc15d84 r8:00000002 r7:60000013 r6:ecc15d8c r5:84925400 r4:84925400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84925400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc15e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593d540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84925400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc07000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85866b8c r4:85866800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85866b8c r4:85961a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84925400 r8:85961a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961a00 r8:8027ed34 r7:ecbe1e60 r6:85927000 r5:84925400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc15fb0 to 0xecc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593d2c0 INFO: task kworker/1:602:6177 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b245a000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/1:603:6178 blocked for more than 477 seconds. r4:85893000 r5:85893000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecba9e08 r4:00000000 r5:00001000 r4:ecc17000 r5:85866f8c r4:85866c00 r7:ddde2d40 r6:83018200 r5:85866f8c r4:85961a80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85893000 r8:85961aac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961a80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961a80 r8:8027ed34 r7:ecbe1e60 r6:85961b00 r5:85893000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecba9fb0 to 0xecba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593d340 INFO: task kworker/1:603:6178 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b29f5000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 Exception stack(0xe06b9fb0 to 0xe06b9ff8) Not tainted 6.15.0-syzkaller #0 r5:85893c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc21e08 r4:00000000 r5:8586738c r4:85867000 r10:00000000 r9:85961b80 r8:8027ed34 r7:ecbe1e60 r6:85961c00 r5:85893c00 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:6182 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:605 state:D stack:0 pid:6182 tgid:6182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc2dd84 r8:00000002 r7:60000113 r6:ecc2dd8c r5:85894800 r4:85894800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85894800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc2de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593db00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85894800 r7:00000000 r6:83018200 r5:00001000 r4:7f017000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85867b8c r4:85867800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85867b8c r4:85961c80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85894800 r8:85961cac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961c80 r8:8027ed34 r7:ecbe1e60 r6:85961d00 r5:85894800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc2dfb0 to 0xecc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593d600 INFO: task kworker/1:605:6182 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b2f7d000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:85896c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecb7de08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85971c80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85896c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6b1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989b8c r4:85989800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85989b8c r4:85927080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85896c00 r8:859270ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85927080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927080 r8:8027ed34 r7:ecb95e60 r6:85961d80 r5:85896c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecb7dfb0 to 0xecb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85971980 INFO: task kworker/0:916:6188 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b31c3000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:606 state:D stack:0 pid:6190 tgid:6190 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85895400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:85961e00 r8:8027ed34 r7:ecc2de60 r6:85961e80 r5:85895400 Workqueue: events bpf_prog_free_deferred r5:800b0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r4:00000001 r4:847ccb40 task:kworker/1:607 state:D stack:0 pid:6191 tgid:6191 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85891800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859260c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85891800 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb81b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85989f8c r4:85989c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85989f8c r4:85961f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85891800 r8:85961f2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:85961f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85961f00 r8:8027ed34 r7:ecc3de60 r6:85961f80 r5:85891800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc41fb0 to 0xecc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593d900 INFO: task kworker/1:607:6191 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b31c3000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:917:6192 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:917 state:D stack:0 pid:6192 tgid:6192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:85898000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc45e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:918:6193 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:918 state:D stack:0 pid:6193 tgid:6193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ec8d5d84 r8:00000002 r7:60000013 r6:ec8d5d8c r5:85898c00 r4:85898c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85898c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec8d5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85898c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb91f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598a38c r4:8598a000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8598a38c r4:85927180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85898c00 r8:859271ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85927180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927180 r8:8027ed34 r7:ecc45e60 r6:8592b080 r5:85898c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec8d5fb0 to 0xec8d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85926040 INFO: task kworker/0:918:6193 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 9d60: 800b0013 ffffffff r4:82ac11e4 r4:e06b9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:608:6194 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:608 state:D stack:0 pid:6194 tgid:6194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc49d84 r8:00000002 r7:60000113 r6:ecc49d8c r5:85899800 r4:85899800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85899800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85924c40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85899800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccbd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a24f8c r4:85a24c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a24f8c r4:8592b100 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85899800 r8:8592b12c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8592b100 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592b100 r8:8027ed34 r7:ecc3de60 r6:8592b180 r5:85899800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc49fb0 to 0xecc49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593df80 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: b3ad9000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:919:6198 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:919 state:D stack:0 pid:6198 tgid:6198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc51d84 r8:00000002 r7:60000013 r6:ecc51d8c r5:8589b000 r4:8589b000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8589b000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926680 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8589b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598ab8c r4:8598a800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8598ab8c r4:85927200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8589b000 r8:8592722c r7:82804d40 r6:dddced40 r5:dddced60 r4:85927200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927200 r8:8027ed34 r7:ecc45e60 r6:8592b200 r5:8589b000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc51fb0 to 0xecc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859262c0 INFO: task kworker/0:919:6198 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b3ed0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:e06b9dc0 r4:00000000 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r5:8501378c r4:85013400 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:8589bc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85927280 r8:8027ed34 r7:ecc51e60 r6:8592b280 r5:8589bc00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859262c0 INFO: task kworker/0:920:6199 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b447d000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:921:6201 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:921 state:D stack:0 pid:6201 tgid:6201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc4dd84 r8:00000002 r7:60000113 r6:ecc4dd8c r5:84926000 r4:84926000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84926000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84926000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebad5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598af8c r4:8598ac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8598af8c r4:85927300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84926000 r8:8592732c r7:82804d40 r6:dddced40 r5:dddced60 r4:85927300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927300 r8:8027ed34 r7:ecc55e60 r6:85927380 r5:84926000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc4dfb0 to 0xecc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85926500 INFO: task kworker/0:921:6201 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b447d000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:922:6205 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:922 state:D stack:0 pid:6205 tgid:6205 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84926c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: r5:800b0013 r4:80239bd0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:85896000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85896000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec67d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598bb8c r4:8598b800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8598bb8c r4:85927500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85896000 r8:8592752c r7:82804d40 r6:dddced40 r5:dddced60 r4:85927500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927500 r8:8027ed34 r7:ecc55e60 r6:85927580 r5:85896000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc5dfb0 to 0xecc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859267c0 INFO: task kworker/0:923:6206 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b4896000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:924:6207 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:924 state:D stack:0 pid:6207 tgid:6207 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc39d84 r8:00000002 r7:60000113 r6:ecc39d8c r5:859bbc00 r4:859bbc00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859bbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc39e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926d00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6a5000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8598bf8c r4:8598bc00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: b4c7c000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r4:82ac11e4 r4:e06b9dc0 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:925:6210 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:925 state:D stack:0 pid:6210 tgid:6210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc65d84 r8:00000002 r7:60000113 r6:ecc65d8c r5:84ae0000 r4:84ae0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85926e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ae0000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6df000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8597f38c r4:8597f000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8597f38c r4:85927700 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae0000 r8:8592772c r7:82804d40 r6:dddced40 r5:dddced60 r4:85927700 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927700 r8:8027ed34 r7:ecc39e60 r6:85927780 r5:84ae0000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06b9d20 to 0xe06b9d68) 9d60: 800b0013 ffffffff r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r4:847da200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829187f4 r9:ecc75d84 r8:00000002 r7:60000013 r6:ecc75d8c r5:8589d400 r5:8589d400 r4:829187f0 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85926a80 INFO: task kworker/0:926:6212 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b4f4b000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Not tainted 6.15.0-syzkaller #0 r5:8589c800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r9:83018005 r8:8589c800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 800b0013 ffffffff r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:928:6215 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:928 state:D stack:0 pid:6215 tgid:6215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc6dd84 r8:00000002 r7:60000113 r6:ecc6dd8c r5:84ae0c00 r4:84ae0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8594f480 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ae0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec73f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599c78c r4:8599c400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599c78c r4:85927900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae0c00 r8:8592792c r7:82804d40 r6:dddced40 r5:dddced60 r4:85927900 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927900 r8:8027ed34 r7:ecc7de60 r6:85927980 r5:84ae0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc6dfb0 to 0xecc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85926dc0 INFO: task kworker/0:928:6215 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b513b000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ecc69d84 r8:00000002 r7:60000113 r6:ecc69d8c r5:84ae2400 r5:84ae2400 r4:829187f0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593c3c0 r10:61c88647 r9:84ae2400 r8:85927a2c r7:82804d40 r6:dddced40 r5:dddced60 Exception stack(0xecc69fb0 to 0xecc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593c100 INFO: task kworker/0:929:6217 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b5471000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:930:6221 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:930 state:D stack:0 pid:6221 tgid:6221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r5:84ae3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fa0: 00000000 00000000 00000000 00000000 9d20: b5471000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:847ccb40 task:kworker/1:609 state:D stack:0 pid:6222 tgid:6222 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84ae4800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85924f40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:84ae4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec90f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2478c r4:85a24400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2478c r4:8592b400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae4800 r8:8592b42c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8592b400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592b400 r8:8027ed34 r7:ecc49e60 r6:85927c00 r5:84ae4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc89fb0 to 0xecc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85924a40 INFO: task kworker/1:609:6222 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b5784000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r5:8501378c r4:85013400 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:84ae3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc81e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:8593c500 Workqueue: events bpf_prog_free_deferred 9d20: b5784000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:932:6225 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:932 state:D stack:0 pid:6225 tgid:6225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc79d84 r8:00000002 r7:60000113 r6:ecc79d8c r5:84ae5400 r4:84ae5400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc79e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593c800 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ae5400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8bd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599d78c r4:8599d400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599d78c r4:85927d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae5400 r8:85927dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85927d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927d80 r8:8027ed34 r7:ecc85e60 r6:85927e00 r5:84ae5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc79fb0 to 0xecc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593c740 INFO: task kworker/0:932:6225 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b5ea6000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:933:6227 blocked for more than 477 seconds. r5:84ae6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc91e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593c740 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ae6000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8e9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599db8c r4:8599d800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599db8c r4:85927e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae6000 r8:85927eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85927e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927e80 r8:8027ed34 r7:ecc85e60 r6:85927f00 r5:84ae6000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc91fb0 to 0xecc91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593c740 INFO: task kworker/0:933:6227 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b5ea6000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:934:6229 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:934 state:D stack:0 pid:6229 tgid:6229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc8dd84 r8:00000002 r7:60000113 r6:ecc8dd8c r5:84ae6c00 r4:84ae6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc8de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593cbc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84ae6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec933000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599df8c r4:8599dc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599df8c r4:85927f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ae6c00 r8:85927fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85927f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85927f80 r8:8027ed34 r7:ecc85e60 r6:85943000 r5:84ae6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc8dfb0 to 0xecc8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593c900 INFO: task kworker/0:934:6229 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b6196000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:935:6233 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:935 state:D stack:0 pid:6233 tgid:6233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc95d84 r8:00000002 r7:60000013 r6:ecc95d8c r5:84ae1800 r4:84ae1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84ae1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:85943080 r8:8027ed34 r7:ecc85e60 r6:85943100 r5:84ae1800 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:936:6235 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:936 state:D stack:0 pid:6235 tgid:6235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc9dd84 r8:00000002 r7:60000013 r6:ecc9dd8c r5:84a80000 r4:84a80000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a80000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc9de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8593ce80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a80000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec95b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599e78c r4:8599e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599e78c r4:85943180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a80000 r8:859431ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85943180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85943180 r8:8027ed34 r7:ecc85e60 r6:85943200 r5:84a80000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc9dfb0 to 0xecc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8593cc80 INFO: task kworker/0:936:6235 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b6532000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:6236 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r5:84a80c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85a24b8c r4:85a24800 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06b9d20 to 0xe06b9d68) 9d60: 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:937:6238 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:937 state:D stack:0 pid:6238 tgid:6238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc99d84 r8:00000002 r7:60000113 r6:ecc99d8c r5:84a81800 r4:84a81800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a81800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc99e08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8593ce40 9d20: b6b0a000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:938:6239 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:938 state:D stack:0 pid:6239 tgid:6239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecca5d84 r8:00000002 r7:60000013 r6:ecca5d8c r5:84a82400 r4:84a82400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84a82400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecca5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85966fc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84a82400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb37000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599ef8c r4:8599ec00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:939:6242 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:939 state:D stack:0 pid:6242 tgid:6242 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829187f4 r9:eccb5d84 r8:00000002 r7:60000113 r6:eccb5d8c r5:84a83000 r5:84a83000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xeccb5fb0 to 0xeccb5ff8) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:940:6244 blocked for more than 477 seconds. r5:84a84800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: b73cc000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:847ccb40 task:kworker/1:611 state:D stack:0 pid:6246 tgid:6246 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84a86000 r4:829187f0 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7c9000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2578c r4:85a25400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2578c r4:8592b500 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a86000 r8:8592b52c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:8592b500 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8592b500 r8:8027ed34 r7:ecc49e60 r6:85943700 r5:84a86000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccd9fb0 to 0xeccd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8595b000 INFO: task kworker/1:611:6246 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b776f000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:84a83c00 r5:84a83c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8595b000 r4:00000000 r4:82ac11e4 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:859d8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596bbc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8599ff8c r4:8599fc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:8599ff8c r4:85943800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859d8c00 r8:8594382c r7:82804d40 r6:dddced40 r5:dddced60 r4:85943800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85943800 r8:8027ed34 r7:eccb5e60 r6:85943880 r5:859d8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec9cdfb0 to 0xec9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596b840 INFO: task kworker/0:941:6252 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b7bb2000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:942:6253 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:942 state:D stack:0 pid:6253 tgid:6253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccddd84 r8:00000002 r7:60000113 r6:eccddd8c r5:859d9800 r4:859d9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859d9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccdde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:85943900 dfa0: 00000000 00000000 00000000 00000000 Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b7bb2000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:859db000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ebbe7000 r10:61c88647 r9:859db000 r8:85943a2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Exception stack(0xe06b9d20 to 0xe06b9d68) r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:944:6257 blocked for more than 478 seconds. r5:859dbc00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbf1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859386c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc81000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a938c r4:859a9000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a938c r4:85943b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859dbc00 r8:85943b2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85943b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85943b00 r8:8027ed34 r7:ecbc9e60 r6:85943b80 r5:859dbc00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbf1fb0 to 0xecbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596bf40 INFO: task kworker/0:944:6257 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b8279000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/1:613:6259 blocked for more than 478 seconds. r5:859d8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: b873e000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:847ccb40 Call trace: r5:859dc800 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc0de08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecc0dfb0 to 0xecc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8595b200 INFO: task kworker/1:614:6260 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b873e000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:945:6262 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:945 state:D stack:0 pid:6262 tgid:6262 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecc1dd84 r8:00000002 r7:60000113 r6:ecc1dd8c r5:859da400 r4:859da400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859da400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecc1de08 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecc1dfb0 to 0xecc1dff8) Workqueue: events bpf_prog_free_deferred 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r5:8589a400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc4d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a8f8c r4:859a8c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a8f8c r4:85943e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8589a400 r8:85943e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85943e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85943e00 r8:8027ed34 r7:ecbf1e60 r6:8592b700 r5:8589a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecccdfb0 to 0xecccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85938440 INFO: task kworker/0:946:6265 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b8aed000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:847ccb40 Workqueue: events bpf_prog_free_deferred r5:8589e000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 INFO: task kworker/0:948:6268 blocked for more than 478 seconds. r5:8589ec00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r5:00001000 r4:ec595000 r10:61c88647 r9:8589ec00 r8:85943f2c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:949:6273 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:949 state:D stack:0 pid:6273 tgid:6273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecbfdd84 r8:00000002 r7:60000013 r6:ecbfdd8c r5:858a0000 r4:858a0000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858a0000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecbfde08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85938c00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec627000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859a9f8c r4:859a9c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859a9f8c r4:85943f80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a0000 r8:85943fac r7:82804d40 r6:dddced40 r5:dddced60 r4:85943f80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85943f80 r8:8027ed34 r7:ecc29e60 r6:8592b880 r5:858a0000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecbfdfb0 to 0xecbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:858a0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecce5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85938f00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7e1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859aab8c r4:859aa800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859aab8c r4:85934000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a0c00 r8:8593402c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934000 r8:8027ed34 r7:ecbfde60 r6:8592b900 r5:858a0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecce5fb0 to 0xecce5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859384c0 INFO: task kworker/0:950:6274 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b9419000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:847da200 9fa0: 00000000 00000000 00000000 00000000 task:kworker/0:951 state:D stack:0 pid:6276 tgid:6276 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:858a1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85938cc0 r7:dddced40 r6:83018000 r5:859aa38c r4:85934080 9fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r4:e06b9dc0 r4:00000000 r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:952:6278 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:952 state:D stack:0 pid:6278 tgid:6278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eccedd84 r8:00000002 r7:60000013 r6:eccedd8c r5:858a2400 r4:858a2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:858a2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85938e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859aa78c r4:859aa400 r10:61c88647 r9:858a2400 r8:8593412c r7:82804d40 r6:dddced40 r5:dddced60 r4:85938c40 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:858a3000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8592ba80 1fa0: 00000000 00000000 00000000 00000000 r4:00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: b9be0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:953:6281 blocked for more than 478 seconds. r4:858a4800 r5:858a4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eccf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859389c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:858a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec82d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859aaf8c r4:859aac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859aaf8c r4:85934180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a4800 r8:859341ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85934180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934180 r8:8027ed34 r7:ecce5e60 r6:8592bb80 r5:858a4800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeccf9fb0 to 0xeccf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85938d40 INFO: task kworker/0:953:6281 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r5:800b0013 r4:80239bd0 r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:954:6283 blocked for more than 478 seconds. r5:858a6000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85947300 r10:61c88647 r9:858a6000 r8:8593422c r7:82804d40 r6:dddced40 r5:dddced60 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 9d60: 800b0013 ffffffff r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:955 state:D stack:0 pid:6284 tgid:6284 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r9:83018005 r8:858a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:00001000 r4:ec86d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:859ab38c r4:859ab000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:859ab38c r4:85934280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:858a6c00 r8:859342ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85934280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934280 r8:8027ed34 r7:ecd01e60 r6:8592bc80 r5:858a6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd05fb0 to 0xecd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85938b80 INFO: task kworker/0:955:6284 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: ba58b000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06b9fb0 to 0xe06b9ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:858a5400 r5:858a5400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xecd0dfb0 to 0xecd0dff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:847da200 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85aa0000 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecd11fb0 to 0xecd11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85947240 INFO: task kworker/0:957:6288 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: baa4a000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:958:6290 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:958 state:D stack:0 pid:6290 tgid:6290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd19d84 r8:00000002 r7:60000013 r6:ecd19d8c r5:85aa1800 r4:85aa1800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aa1800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85947940 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa1800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca65000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a64b8c r4:85a64800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a64b8c r4:85934400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa1800 r8:8593442c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:00001000 r4:dfacd000 r4:847da200 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:959:6292 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:959 state:D stack:0 pid:6292 tgid:6292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd21d84 r8:00000002 r7:60000013 r6:ecd21d8c r5:85aa3000 r4:85aa3000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aa3000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd21e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859476c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa3000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca01000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6438c r4:85a64000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6438c r4:85934480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa3000 r8:859344ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85934480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934480 r8:8027ed34 r7:ecd19e60 r6:8592be80 r5:85aa3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd21fb0 to 0xecd21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:8501378c r4:85013400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:960:6294 blocked for more than 478 seconds. r5:859dec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeccfdfb0 to 0xeccfdff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:961:6297 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:961 state:D stack:0 pid:6297 tgid:6297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd25d84 r8:00000002 r7:60000113 r6:ecd25d8c r5:859de000 r4:859de000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:859de000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd25e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85947b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:859de000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca71000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a64f8c r4:85a64c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a64f8c r4:85934600 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:859de000 r8:8593462c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934600 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934600 r8:8027ed34 r7:ecd19e60 r6:85934680 r5:859de000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd25fb0 to 0xecd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85947680 INFO: task kworker/0:961:6297 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bacf6000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:962:6298 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:962 state:D stack:0 pid:6298 tgid:6298 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r5:00001000 r4:eca9b000 r10:61c88647 r9:859dd400 r8:8593472c r7:82804d40 r6:dddced40 r5:dddced60 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 Not tainted 6.15.0-syzkaller #0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb7f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a65f8c r4:85a65c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a65f8c r4:85934800 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa2400 r8:8593482c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934800 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934800 r8:8027ed34 r7:eccf5e60 r6:8592bf00 r5:85aa2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd39fb0 to 0xecd39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85947a80 INFO: task kworker/0:963:6301 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bb5c1000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecd41fb0 to 0xecd41ff8) Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:965:6304 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:965 state:D stack:0 pid:6304 tgid:6304 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd45d84 r8:00000002 r7:60000013 r6:ecd45d8c r5:85aa3c00 r4:85aa3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aa3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd45e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85947f00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecadb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a65b8c r4:85a65800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a65b8c r4:85934900 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xecd45fb0 to 0xecd45ff8) Call trace: 9d60: 800b0013 ffffffff [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd4de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85924dc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc09000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6678c r4:85a66400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6678c r4:85934980 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa0c00 r8:859349ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85934980 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934980 r8:8027ed34 r7:ecd39e60 r6:859f7080 r5:85aa0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd4dfb0 to 0xecd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85947f40 INFO: task kworker/0:966:6306 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bbda7000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe06b9fb0 to 0xe06b9ff8) Not tainted 6.15.0-syzkaller #0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd2de08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a6638c r4:85934a00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe06b9d20 to 0xe06b9d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:616:6310 blocked for more than 478 seconds. task:kworker/1:616 state:D stack:0 pid:6310 tgid:6310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd51d84 r8:00000002 r7:60000113 r6:ecd51d8c r5:85aa6c00 r4:85aa6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aa6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd51e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859ecd40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85aa6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd61000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a2678c r4:85a26400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a2678c r4:859f7180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa6c00 r8:859f71ac r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859f7180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f7180 r8:8027ed34 r7:ecc01e60 r6:859f7200 r5:85aa6c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd51fb0 to 0xecd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859ec580 INFO: task kworker/1:616:6310 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bc0c3000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:82ac11e4 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd5de08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:969:6314 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:969 state:D stack:0 pid:6314 tgid:6314 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd65d84 r8:00000002 r7:60000013 r6:ecd65d8c r5:85aa8c00 r4:85aa8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aa8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd65e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f6040 r4:00000000 r9:83018005 r8:85aa8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 r4:85934b00 Exception stack(0xecd65fb0 to 0xecd65ff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:617 state:D stack:0 pid:6319 tgid:6319 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fd180 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85aaa400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec68f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6978c r4:85a69400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a6978c r4:859f7400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aaa400 r8:859f742c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859f7400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f7400 r8:8027ed34 r7:ecc01e60 r6:859f7480 r5:85aaa400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd49fb0 to 0xecd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859ecbc0 INFO: task kworker/1:617:6319 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bce07000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:971:6320 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:971 state:D stack:0 pid:6320 tgid:6320 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd85d84 r8:00000002 r7:60000013 r6:ecd85d8c r5:85aab000 r4:85aab000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aab000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd85e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f6500 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aab000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd79000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6738c r4:85a67000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6738c r4:85934c00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aab000 r8:85934c2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934c00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934c00 r8:8027ed34 r7:ecd69e60 r6:859f7500 r5:85aab000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd85fb0 to 0xecd85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f6000 Workqueue: events bpf_prog_free_deferred 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:85a67b8c r4:85a67800 r10:00000000 r9:85934c80 r8:8027ed34 r7:ecd69e60 r6:859f7580 r5:85aabc00 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/0:973:6326 blocked for more than 478 seconds. r5:85aac800 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aac800 r8:85934d2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934d00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934d00 r8:8027ed34 r7:ecd31e60 r6:859f7600 r5:85aac800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd8dfb0 to 0xecd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f6640 INFO: task kworker/0:973:6326 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bd5d7000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:859f67c0 Workqueue: events bpf_prog_free_deferred 9d60: 800b0013 ffffffff r4:00000000 r5:00001000 r4:dfacd000 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f6a80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aae000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb843000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6838c r4:85a68000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6838c r4:85934e00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aae000 r8:85934e2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934e00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934e00 r8:8027ed34 r7:ecd8de60 r6:859f7700 r5:85aae000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd95fb0 to 0xecd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f6980 INFO: task kworker/0:975:6330 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bdd24000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85aaec00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd99e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596d040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aaec00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec741000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a69f8c r4:85a69c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a69f8c r4:85934e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aaec00 r8:85934eac r7:82804d40 r6:dddced40 r5:dddced60 r4:85934e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934e80 r8:8027ed34 r7:ecd8de60 r6:859f7780 r5:85aaec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd99fb0 to 0xecd99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f6ac0 INFO: task kworker/0:976:6332 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bddfe000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 INFO: task kworker/0:977:6334 blocked for more than 478 seconds. r10:829187f4 r9:ecd9dd84 r8:00000002 r7:60000113 r6:ecd9dd8c r5:85aa5400 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd9de08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aa5400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7d000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a68b8c r4:85a68800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a68b8c r4:85934f00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aa5400 r8:85934f2c r7:82804d40 r6:dddced40 r5:dddced60 r4:85934f00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85934f00 r8:8027ed34 r7:ecd99e60 r6:859f7800 r5:85aa5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd9dfb0 to 0xecd9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f6c40 INFO: task kworker/0:977:6334 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 r4:00000000 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r10:829187f4 r9:ecda1d84 r8:00000002 r7:60000013 r6:ecda1d8c r5:85ab0000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) r4:00000000 r5:85a68f8c r4:85a68c00 r10:00000000 r9:85934f80 r8:8027ed34 r7:ecd99e60 r6:859f7880 r5:85ab0000 INFO: task kworker/0:978:6336 is blocked on a mutex likely owned by task kworker/1:224:3809. r5:800b0013 r4:80239bd0 r4:00000000 r5:00001000 r4:dfacd000 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:979:6337 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:979 state:D stack:0 pid:6337 tgid:6337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecda5d84 r8:00000002 r7:60000113 r6:ecda5d8c r5:85ab0c00 r4:85ab0c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ab0c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859f6300 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ab0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcfd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6938c r4:85a69000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6938c r4:859f5000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab0c00 r8:859f502c r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5000 r8:8027ed34 r7:ecd99e60 r6:859f7900 r5:85ab0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecda5fb0 to 0xecda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859f6b00 INFO: task kworker/0:979:6337 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: be967000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/0:980:6340 blocked for more than 479 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd89e08 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecd89fb0 to 0xecd89ff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:618:6341 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:618 state:D stack:0 pid:6341 tgid:6341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecda9d84 r8:00000002 r7:60000113 r6:ecda9d8c r5:85ab2400 r4:85ab2400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ab2400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecda9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:859fd2c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ab2400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec6bb000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a26f8c r4:85a26c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:85a26f8c r4:859f7a00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab2400 r8:859f7a2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859f7a00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f7a00 r8:8027ed34 r7:ecc01e60 r6:859f7a80 r5:85ab2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:00000000 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r5:00001000 r4:dfacd000 r4:847da200 9fa0: 00000000 00000000 00000000 00000000 task:kworker/1:619 state:D stack:0 pid:6343 tgid:6343 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb1e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8535a580 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:85ab3000 r7:00000000 r6:83018200 r5:00001000 r4:7f1d7000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd7b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:844e0f8c r4:844e0c00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:844e0f8c r4:859f7b00 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab3000 r8:859f7b2c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:859f7b00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f7b00 r8:8027ed34 r7:ecc01e60 r6:859f7b80 r5:85ab3000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdb1fb0 to 0xecdb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:859fd140 INFO: task kworker/1:619:6343 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bf1da000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ccb40 task:kworker/0:981 state:D stack:0 pid:6346 tgid:6346 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdbde08 r4:00000000 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:ec94f000 r10:61c88647 r9:85ab5400 r8:859f512c r7:82804d40 r6:dddced40 r5:dddced60 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 9d20: bf470000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r4:00000000 r5:00001000 r4:dfacd000 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:982 state:D stack:0 pid:6347 tgid:6347 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdc1e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8596d2c0 INFO: task kworker/0:982:6347 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bf845000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:983:6349 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:983 state:D stack:0 pid:6349 tgid:6349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdc9d84 r8:00000002 r7:60000113 r6:ecdc9d8c r5:85ab4800 r4:85ab4800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ab4800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdc9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596d400 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ab4800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec871000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6a78c r4:85a6a400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:859f5200 r8:8027ed34 r7:ecdbde60 r6:859f7d00 r5:85ab4800 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596d340 INFO: task kworker/0:983:6349 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r5:00001000 r4:dfacd000 r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) INFO: task kworker/0:984:6351 blocked for more than 479 seconds. r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:859f5280 r8:8027ed34 r7:ecdbde60 r6:859f7d80 r5:85ab6000 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 r4:847ccb40 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdd9d84 r8:00000002 r7:60000113 r6:ecdd9d8c r5:85ab8c00 r4:85ab8c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ab8c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdd9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596d6c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ab8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8d7000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6af8c r4:85a6ac00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6af8c r4:859f5300 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab8c00 r8:859f532c r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5300 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5300 r8:8027ed34 r7:ecdbde60 r6:859f7e00 r5:85ab8c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdd9fb0 to 0xecdd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596d380 INFO: task kworker/0:985:6353 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bfb61000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fa0: 00000000 00000000 00000000 00000000 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdade08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85a6b38c r4:859f5380 Exception stack(0xecdadfb0 to 0xecdadff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: bfb61000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecddde08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a6b78c r4:859f5480 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 r5:00001000 r4:dfacd000 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 INFO: task kworker/0:988:6360 blocked for more than 479 seconds. r4:84938000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdb5e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r7:dddced40 r6:83018000 r5:85a6c38c r4:859f5580 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596d940 INFO: task kworker/0:988:6360 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c0006000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:847ccb40 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:989 state:D stack:0 pid:6362 tgid:6362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecde5d84 r8:00000002 r7:60000013 r6:ecde5d8c r5:84938c00 r4:84938c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:84938c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596dc40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:84938c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec96f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6bf8c r4:85a6bc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6bf8c r4:859f5680 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84938c00 r8:859f56ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5680 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5680 r8:8027ed34 r7:ecdb5e60 r6:859f5700 r5:84938c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecde5fb0 to 0xecde5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 9d60: 800b0013 ffffffff r4:e06b9dc0 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Call trace: [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde1e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a6cf8c r4:85a6cc00 r10:00000000 r9:859f5780 r8:8027ed34 r7:ecdb5e60 r6:859f5800 r5:84939800 task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdede08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8596d540 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aba400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecbc1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6c78c r4:85a6c400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6c78c r4:859f5880 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85aba400 r8:859f58ac r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5880 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5880 r8:8027ed34 r7:ecde1e60 r6:859f7e80 r5:85aba400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdedfb0 to 0xecdedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:8596ddc0 INFO: task kworker/0:991:6366 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c0ccd000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:992 state:D stack:0 pid:6368 tgid:6368 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf5e08 [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r5:00001000 r4:eccb7000 r10:61c88647 r9:8493b000 r8:859f592c r7:82804d40 r6:dddced40 r5:dddced60 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:8596dd00 INFO: task kworker/0:992:6368 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c0ccd000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:620:6369 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:620 state:D stack:0 pid:6369 tgid:6369 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf1e08 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xecdf1fb0 to 0xecdf1ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe06b9d20 to 0xe06b9d68) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) task:kworker/0:993 state:D stack:0 pid:6372 tgid:6372 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecde9e08 r4:00000000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85a050c0 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:847da200 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:994:6374 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:994 state:D stack:0 pid:6374 tgid:6374 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecdf9d84 r8:00000002 r7:60000013 r6:ecdf9d8c r5:8493d400 r4:8493d400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:8493d400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecdf9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a055c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493d400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece03000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6d78c r4:85a6d400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6d78c r4:859f5b80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493d400 r8:859f5bac r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5b80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5b80 r8:8027ed34 r7:ecde9e60 r6:859f5c00 r5:8493d400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecdf9fb0 to 0xecdf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a050c0 INFO: task kworker/0:994:6374 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c11be000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 r4:e06b9dc0 r5:00001000 r4:dfacd000 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:995:6376 blocked for more than 479 seconds. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece01e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a058c0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493e000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece1b000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6df8c r4:85a6dc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6df8c r4:859f5c80 r10:61c88647 r9:8493e000 r8:859f5cac r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5c80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5c80 r8:8027ed34 r7:ecdf9e60 r6:859f5d00 r5:8493e000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece01fb0 to 0xece01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a05440 INFO: task kworker/0:995:6376 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece0de08 r4:00000000 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/0:996:6378 is blocked on a mutex likely owned by task kworker/1:224:3809. r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece19e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:8493a400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece33000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6e78c r4:85a6e400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6e78c r4:859f5e80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8493a400 r8:859f5eac r7:82804d40 r6:dddced40 r5:dddced60 r4:859f5e80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:859f5e80 r8:8027ed34 r7:ece01e60 r6:859f5f00 r5:8493a400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece19fb0 to 0xece19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a05740 INFO: task kworker/0:997:6381 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c17fd000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 task:kworker/0:998 state:D stack:0 pid:6382 tgid:6382 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:85ae0000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 r4:859f5f80 5fa0: 00000000 00000000 00000000 00000000 Call trace: r5:800b0013 r4:80239bd0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85ae0c00 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece31e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05d00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece3f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6eb8c r4:85a6e800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6eb8c r4:85a12080 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae0c00 r8:85a120ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a12080 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a12080 r8:8027ed34 r7:ece19e60 r6:85a12100 r5:85ae0c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece31fb0 to 0xece31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a05980 INFO: task kworker/0:999:6384 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c1e7c000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:847da200 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829187f4 r9:ece49d84 r8:00000002 r7:60000113 r6:ece49d8c r5:85ae2400 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece49e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a05fc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece57000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6f38c r4:85a6f000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6f38c r4:85a12280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae2400 r8:85a122ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a12280 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a12280 r8:8027ed34 r7:ece3de60 r6:85a12300 r5:85ae2400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece49fb0 to 0xece49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a05f00 INFO: task kworker/0:1001:6388 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c23af000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe06b9fb0 to 0xe06b9ff8) Not tainted 6.15.0-syzkaller #0 r5:85ae3000 r4:829187f0 r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece55e08 r4:00000000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:85a05e40 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece6dd84 r8:00000002 r7:60000013 r6:ece6dd8c r5:85ae3c00 r4:85ae3c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ae3c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece6de08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a16380 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ece73000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a6fb8c r4:85a6f800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a6fb8c r4:85a12480 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae3c00 r8:85a124ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a12480 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a12480 r8:8027ed34 r7:ece55e60 r6:85a12500 r5:85ae3c00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xece6dfb0 to 0xece6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a16000 INFO: task kworker/0:1003:6391 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c2af7000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r5:85a6ff8c r4:85a6fc00 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 9d20: c2af7000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1005:6395 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1005 state:D stack:0 pid:6395 tgid:6395 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1007:6400 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1007 state:D stack:0 pid:6400 tgid:6400 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece95d84 r8:00000002 r7:60000113 r6:ece95d8c r5:85ae6c00 r4:85ae6c00 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ae6c00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece95e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a16b00 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eceaf000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:85a16640 Exception stack(0xe06b9d20 to 0xe06b9d68) [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1008:6401 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1008 state:D stack:0 pid:6401 tgid:6401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ece89d84 r8:00000002 r7:60000113 r6:ece89d8c r5:85ae8000 r4:85ae8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ae8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ece89e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a16900 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae8000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecea3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85a12980 Exception stack(0xece89fb0 to 0xece89ff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1009:6404 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r4:85ae8c00 r5:85ae8c00 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecea1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r9:83018005 r8:85ae8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 r5:85a7d78c r4:85a7d400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a16ac0 INFO: task kworker/0:1009:6404 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c3489000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1010:6406 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1010 state:D stack:0 pid:6406 tgid:6406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eceadd84 r8:00000002 r7:60000013 r6:eceadd8c r5:85aea400 r4:85aea400 r5:85aea400 r4:829187f0 [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a16ac0 r10:61c88647 r9:85aea400 r8:85a12bac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a16a00 Call trace: 9d60: 800b0013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) r7:dddced40 r6:83018000 r5:85a7ef8c r4:85a12c80 Exception stack(0xecd3dfb0 to 0xecd3dff8) task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1012:6409 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1012 state:D stack:0 pid:6409 tgid:6409 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecd55d84 r8:00000002 r7:60000113 r6:ecd55d8c r5:85ae9800 r4:85ae9800 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ae9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecd55e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b14040 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ae9800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed1000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7db8c r4:85a7d800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a7db8c r4:85a12d80 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ae9800 r8:85a12dac r7:82804d40 r6:dddced40 r5:dddced60 r4:85a12d80 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85a12d80 r8:8027ed34 r7:ecd3de60 r6:85a12e00 r5:85ae9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecd55fb0 to 0xecd55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85a16b40 INFO: task kworker/0:1012:6409 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c3fd1000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847ccb40 Workqueue: events bpf_prog_free_deferred [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b14280 r7:dddced40 r6:83018000 r5:85a7df8c r4:85a12e80 9fa0: 00000000 00000000 00000000 00000000 r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1014:6413 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1014 state:D stack:0 pid:6413 tgid:6413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecec5d84 r8:00000002 r7:60000113 r6:ecec5d8c r5:85aed400 r4:85aed400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85aed400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecec5e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b14600 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85aed400 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8fd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06b9d20 to 0xe06b9d68) r4:82ac11e4 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe06b9fb0 to 0xe06b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 task:kworker/0:1015 state:D stack:0 pid:6416 tgid:6416 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r4:00000000 r5:00001000 r4:ebc09000 r7:dddced40 r6:83018000 r5:85a7eb8c r4:85b16100 r10:00000000 r9:85b16100 r8:8027ed34 r7:ecd3de60 r6:859f7f80 r5:85abbc00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b14480 INFO: task kworker/0:1015:6416 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c3fd1000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1016:6418 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1016 state:D stack:0 pid:6418 tgid:6418 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:eced9d84 r8:00000002 r7:60000113 r6:eced9d8c r5:85ab8000 r4:85ab8000 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85ab8000 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eced9e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b14a40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85ab8000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7f38c r4:85a7f000 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a7f38c r4:85b16180 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab8000 r8:85b161ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b16180 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b16180 r8:8027ed34 r7:ecd3de60 r6:85b21000 r5:85ab8000 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeced9fb0 to 0xeced9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred Exception stack(0xe06b9d20 to 0xe06b9d68) [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r5:8501378c r4:85013400 r4:847da200 Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b14bc0 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) 9d20: c49a4000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:847ccb40 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:1018:6422 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1018 state:D stack:0 pid:6422 tgid:6422 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a611e0>] (__schedule_loop kernel/sched/core.c:6863 [inline]) [<81a60258>] (__schedule) from [<81a611e0>] (schedule+0x2c/0x130 kernel/sched/core.c:6878) r10:829187f4 r9:ecee1d84 r8:00000002 r7:60000113 r6:ecee1d8c r5:85abd400 r4:85abd400 [<81a611b4>] (schedule) from [<81a615c8>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6935) r5:85abd400 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecee1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a16b80 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85abd400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec98f000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a80b8c r4:85a80800 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a80b8c r4:85b16280 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85abd400 r8:85b162ac r7:82804d40 r6:dddced40 r5:dddced60 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:e06b9dc0 r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 task:kworker/0:1019 state:D stack:0 pid:6425 tgid:6425 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r4:00000000 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b14b40 INFO: task kworker/0:1019:6425 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c4ff6000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018205 r8:848b5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfacd000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8501378c r4:85013400 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d40 r6:83018200 r5:8501378c r4:847da200 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 r4:847da200 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847da200 r8:8027ed34 r7:e06b1e60 r6:847c6900 r5:848b5400 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:1020:6427 blocked for more than 479 seconds. r5:85abec00 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) [<81a639ac>] (__mutex_lock.constprop.0) from [<81a64178>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1035) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecef1e08 r4:00000000 [<81a64164>] (__mutex_lock_slowpath) from [<81a641b8>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:278) [<81a6417c>] (mutex_lock) from [<804e4f24>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2904) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vm_reset_perms mm/vmalloc.c:3335 [inline]) [<804e4ebc>] (_vm_unmap_aliases) from [<804e8e14>] (vfree+0x16c/0x210 mm/vmalloc.c:3414) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85b14e40 r4:00000000 [<804e8ca8>] (vfree) from [<80549fcc>] (execmem_free+0x30/0x50 mm/execmem.c:433) r9:83018005 r8:85abec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<80549f9c>] (execmem_free) from [<803c6d0c>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7b3000 [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c6cfc>] (bpf_jit_free_exec) from [<803c70ec>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7ff8c r4:85a7fc00 [<803c8030>] (bpf_prog_free_deferred) from [<8027e2e8>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced40 r6:83018000 r5:85a7ff8c r4:85b16380 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85abec00 r8:85b163ac r7:82804d40 r6:dddced40 r5:dddced60 r4:85b16380 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b16380 r8:8027ed34 r7:ecee1e60 r6:85b21200 r5:85abec00 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecef1fb0 to 0xecef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b149c0 INFO: task kworker/0:1020:6427 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe06b9d20 to 0xe06b9d68) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8497fcc0 [<803c7084>] (bpf_jit_free) from [<803c817c>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:848b5400 r8:847da22c r7:82804d40 r6:ddde2d40 r5:ddde2d60 Exception stack(0xe06b9fb0 to 0xe06b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 Workqueue: events bpf_prog_free_deferred r5:85ab9800 r4:829187f0 [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock_common kernel/locking/mutex.c:679 [inline]) [<81a615b0>] (schedule_preempt_disabled) from [<81a63cac>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:747) r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ecefde08 r9:83018005 r8:85ab9800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 r7:dddced40 r6:83018000 r5:85a8038c r4:85b16400 [<8027e134>] (process_one_work) from [<8027ef30>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e134>] (process_one_work) from [<8027ef30>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85ab9800 r8:85b1642c r7:82804d40 r6:dddced40 r5:dddced60 r4:85b16400 [<8027ed34>] (worker_thread) from [<80285f5c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85b16400 r8:8027ed34 r7:ecee1e60 r6:85b21280 r5:85ab9800 r4:00000001 [<80285e30>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xecefdfb0 to 0xecefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80285e30 r4:85b14c00 INFO: task kworker/0:1021:6430 is blocked on a mutex likely owned by task kworker/1:224:3809. task:kworker/1:224 state:R running task stack:0 pid:3809 tgid:3809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a60258>] (__schedule) from [<81a61614>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7108) r10:8280c9b4 r9:848b5400 r8:80200be4 r7:e06b9d54 r6:ffffffff r5:848b5400 r4:00000000 [<81a615d4>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe06b9d20 to 0xe06b9d68) 9d20: c53c0000 ee905000 00000001 80239bb8 7f84d000 00000001 82ac11c4 82ac05a0 9d40: 7f84d000 ee905000 8280c9b4 e06b9d9c e06b9da0 e06b9d70 80230af4 80239bd0 9d60: 800b0013 ffffffff r5:800b0013 r4:80239bd0 [<80230a90>] (flush_tlb_kernel_range) from [<804e4ce8>] (__purge_vmap_area_lazy+0x284/0x458 mm/vmalloc.c:2328) r4:82ac11e4 [<804e4a64>] (__purge_vmap_area_lazy) from [<804e50a0>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2943) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e06b9dc0 r5:e06b9e08 r4:e06b9dc0